CVE-2010-1443
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/12/2014
Last modified:
12/04/2025
Description
The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format (XSPF) document.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:* | 1.0.5 (including) | |
| cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba%3Dcommit%3Bh%3D8902488ba529c0cf4c903a8a84ff20b5737cc753
- http://openwall.com/lists/oss-security/2010/04/28/4
- http://www.videolan.org/security/sa1003.html
- http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba%3Dcommit%3Bh%3D8902488ba529c0cf4c903a8a84ff20b5737cc753
- http://openwall.com/lists/oss-security/2010/04/28/4
- http://www.videolan.org/security/sa1003.html



