Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-46461

Опубликовано: 25 сент. 2024
Источник: debian
EPSS Низкий

Описание

VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vlcfixed3.0.21-1package

Примечания

  • https://www.videolan.org/security/sb-vlc3021.html

  • https://code.videolan.org/videolan/vlc/-/commit/e7f98f3632d793c3921bfe72595721af191e670e (v3.0.21)

EPSS

Процентиль: 53%
0.00301
Низкий

Связанные уязвимости

CVSS3: 8
ubuntu
9 месяцев назад

VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges.

CVSS3: 8
nvd
9 месяцев назад

VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges.

CVSS3: 8
redos
9 месяцев назад

Уязвимость vlc

CVSS3: 8
github
9 месяцев назад

VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges.

CVSS3: 8
fstec
9 месяцев назад

Уязвимость медиаплеера VLC Media Player, связанная с переполнением буфера в куче, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код в контексте root

EPSS

Процентиль: 53%
0.00301
Низкий