{"vuid":"VU#200928","idnumber":"200928","name":"VLC Media Player format string vulnerability","keywords":["VLC Media Player","format string","arbitrary code execution",".SAP/SDP messages"],"overview":"VLC contains a format string vulnerability that may allow an attacker to execute code.","clean_desc":"VideoLAN (VLC) is a streaming media player that runs on multiple platforms. From VideoLAN Security Advisory 0702: VLC media player Ogg/Vorbis, Ogg/Theora, CDDA (CD Digital Audio) and SAP (Service Announce Protocol) plugins are prone to a C-style format string vulnerability when trying to parse a media data stream. Valid but carefully crafted .ogg (Vorbis) or .ogm (Theora) files, CDDB entries or SAP/SDP messages can trigger the bug. We therefore consider this bug to have a high severity. Note that VLC distributes a plugin for Mozilla-based browsers. If the VLC browser plugin is used, an attacker may be able to exploit this vulnerability by convincing a user to go to a webpage.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running VLC.","resolution":"Upgrade\nVLC media player 0.8.6c has been released to address this issue.","workarounds":"Disable the affected components Disabling the affected VLC plugins and components may mitigate this vulnerability. See the workarounds section of VideoLAN Security Advisory 0702 for more details.","sysaffected":"","thanks":"Thanks to the VLC team for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.videolan.org/sa0702.html","http://www.tech-faq.com/format-string-vulnerability.shtml","http://www.securityfocus.com/bid/24555","http://www.frsirt.com/english/advisories/2007/2262","http://secunia.com/advisories/25753","http://www.isecpartners.com/advisories/2007-001-vlc.txt"],"cveids":["CVE-2007-3316"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-06-25T18:18:14Z","publicdate":"2007-06-20T00:00:00Z","datefirstpublished":"2007-07-23T15:23:22Z","dateupdated":"2007-07-24T16:50:57Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"9","cam_exploitation":"4","cam_internetinfrastructure":"3","cam_population":"14","cam_impact":"14","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.82","cam_scorecurrentwidelyknown":"14.88375","cam_scorecurrentwidelyknownexploited":"23.70375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.82,"vulnote":null}