|
This is a multi-part message in MIME format.
--------------000302020501020700000701
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 7bit
Please find attached a detailed advisory of the vulnerability.
Alternatively, the advisory can also be found at:
http://www.trapkit.de/advisories/TKADV2008-013.txt
--------------000302020501020700000701
Content-Type: text/plain;
name="TKADV2008-013.txt"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
filename="TKADV2008-013.txt"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: VLC media player RealMedia Processing Integer
Overflow Vulnerability
Advisory ID: TKADV2008-013
Revision: 1.0
Release Date: 2008/11/30
Last Modified: 2008/11/30
Date Reported: 2008/11/14
Author: Tobias Klein (tk at trapkit.de)
Affected Software: VLC media player < 0.9.7
Remotely Exploitable: Yes
Locally Exploitable: No
Vendor URL: http://www.videolan.org/
Vendor Status: Vendor has released an updated version
CVE-ID: CVE-2008-5276
Patch development time: 16 days
=====================Vulnerability Details:
=====================
The VLC media player contains an integer overflow vulnerability while
parsing malformed RealMedia (.rm) files. The vulnerability leads to a heap
overflow that can be exploited by a (remote) attacker to execute arbitrary
code in the context of VLC media player.
=================Technical Details:
=================
Source code file: modules\demux\real.c
[...]
891 static void ReadRealIndex( demux_t *p_demux )
892 {
...
900 uint32_t i_index_count;
...
920 [1] i_index_count = GetDWBE( &buffer[10] );
...
931 [2] p_sys->p_index =
932 (rm_index_t *)malloc( sizeof( rm_index_t ) *
(i_index_count+1) );
933 if( p_sys->p_index == NULL )
934 return;
935
936 memset(p_sys->p_index, 0, sizeof(rm_index_t) * (i_index_count+1));
937
938 [3] for( i=0; i