Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6q3h-pc9x-4hhc

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.

Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.

EPSS

Процентиль: 92%
0.09199
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.

nvd
больше 17 лет назад

Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.

debian
больше 17 лет назад

Integer signedness error in the mms_ReceiveCommand function in modules ...

CVSS3: 5.6
fstec
больше 17 лет назад

Уязвимость функции mms_ReceiveCommand (modules/access/mms/mmstu.c) программы-медиапроигрывателя VideoLAN VLC, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.09199
Низкий