CVE-2010-3124
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/08/2010
Last modified:
11/04/2025
Description
Untrusted search path vulnerability in bin/winvlc.c in VLC Media Player 1.1.3 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll that is located in the same folder as a .mp3 file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:* | 1.1.3 (including) | |
| cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:* | ||
| cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba%3Dblobdiff%3Bf%3Dbin/winvlc.c%3Bh%3Dac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp%3D2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb%3D43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb%3D2d366da738b19f8d761d7084746c6db6f52808c6
- http://secunia.com/advisories/41107
- http://www.exploit-db.com/exploits/14750
- http://www.openwall.com/lists/oss-security/2010/08/25/10
- http://www.openwall.com/lists/oss-security/2010/08/25/9
- http://www.vupen.com/english/advisories/2010/2172
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190
- http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba%3Dblobdiff%3Bf%3Dbin/winvlc.c%3Bh%3Dac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp%3D2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb%3D43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb%3D2d366da738b19f8d761d7084746c6db6f52808c6
- http://secunia.com/advisories/41107
- http://www.exploit-db.com/exploits/14750
- http://www.openwall.com/lists/oss-security/2010/08/25/10
- http://www.openwall.com/lists/oss-security/2010/08/25/9
- http://www.vupen.com/english/advisories/2010/2172
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190



