Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pp8c-mm4f-pg89

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer underflow in the real_get_rdt_chunk function in real.c, as used in modules/access/rtsp/real.c in VideoLAN VLC media player before 1.0.1 and stream/realrtsp/real.c in MPlayer before r29447, allows remote attackers to execute arbitrary code via a crafted length value in an RDT chunk header.

Integer underflow in the real_get_rdt_chunk function in real.c, as used in modules/access/rtsp/real.c in VideoLAN VLC media player before 1.0.1 and stream/realrtsp/real.c in MPlayer before r29447, allows remote attackers to execute arbitrary code via a crafted length value in an RDT chunk header.

EPSS

Процентиль: 86%
0.02991
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer underflow in the real_get_rdt_chunk function in real.c, as used in modules/access/rtsp/real.c in VideoLAN VLC media player before 1.0.1 and stream/realrtsp/real.c in MPlayer before r29447, allows remote attackers to execute arbitrary code via a crafted length value in an RDT chunk header.

nvd
почти 11 лет назад

Integer underflow in the real_get_rdt_chunk function in real.c, as used in modules/access/rtsp/real.c in VideoLAN VLC media player before 1.0.1 and stream/realrtsp/real.c in MPlayer before r29447, allows remote attackers to execute arbitrary code via a crafted length value in an RDT chunk header.

debian
почти 11 лет назад

Integer underflow in the real_get_rdt_chunk function in real.c, as use ...

EPSS

Процентиль: 86%
0.02991
Низкий