Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vp3g-9vrc-rfw7

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.

The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.

EPSS

Процентиль: 81%
0.01634
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.

CVSS3: 7.8
nvd
около 6 лет назад

The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.

CVSS3: 7.8
debian
около 6 лет назад

The GetUpdateFile function in misc/update.c in the Updater in VideoLAN ...

EPSS

Процентиль: 81%
0.01634
Низкий