CVE-2011-3623
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
26/12/2014
Last modified:
12/04/2025
Description
Multiple stack-based buffer overflows in VideoLAN VLC media player before 1.0.2 allow remote attackers to execute arbitrary code via (1) a crafted ASF file, related to the ASF_ObjectDumpDebug function in modules/demux/asf/libasf.c; (2) a crafted AVI file, related to the AVI_ChunkDumpDebug_level function in modules/demux/avi/libavi.c; or (3) a crafted MP4 file, related to the __MP4_BoxDumpStructure function in modules/demux/mp4/libmp4.c.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:* | 1.0.1 (including) | |
| cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3D861e374d03e6c60c7d3c98428c632fe3b9e371b2
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3Dc5b02d011b8c634d041167f4d2936b55eca4d18d
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3Ddfe7084e8cc64e9b7a87cd37065b59cba2064823
- http://openwall.com/lists/oss-security/2011/10/18/10
- http://www.videolan.org/security/sa0901.html
- https://bugs.gentoo.org/show_bug.cgi?id=285370
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3D861e374d03e6c60c7d3c98428c632fe3b9e371b2
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3Dc5b02d011b8c634d041167f4d2936b55eca4d18d
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3Ddfe7084e8cc64e9b7a87cd37065b59cba2064823
- http://openwall.com/lists/oss-security/2011/10/18/10
- http://www.videolan.org/security/sa0901.html
- https://bugs.gentoo.org/show_bug.cgi?id=285370



