sa1203.php 2.33 KB
Newer Older
1
<?php
2
   $title = "VideoLAN Security Advisory 1203";
3 4 5
   $lang = "en";
   $menu = array( "vlc" );
   $body_color = "red";
6
   require($_SERVER["DOCUMENT_ROOT"]."/include/header.php");
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
?>

<div id="fullwidth">

<h1>Security Advisory 1203</h1>
<pre>
Summary           : Buffer overflow in PNG decoder
Date              : October 2012
Affected versions : VLC media player 2.0.3 and earlier
ID                : VideoLAN-SA-1203
CVE reference     : CVE-2012-5470
</pre>
<h2>Details</h2>
<p>When parsing an invalid PNG image file,
a buffer overflow might occur.
</p>
<h2>Impact</h2>
<p>If successful,
25 26 27 28 29
a malicious third party could trigger an invalid memory access,
leading to a crash of the process of the VLC media player.
</p>
<p>Because the overflow occurs while reading a buffer, rather than writing,
it is believed that this issue cannot lead to arbitrary code execution.
30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
</p>
<h2>Threat mitigation</h2>
<p>Exploitation of this issue requires the user
to explicitly open a specially crafted file.
</p>
<h2>Workarounds</h2>
<p>The user should refrain from opening files from untrusted third parties
or accessing untrusted remote sites (or disable the VLC browser plugins),
until the patch is applied.
</p>
<p>Alternatively, the PNG decoder plugin (<code>libpng_plugin.*</code>)
can be removed manually from the VLC plugin installation directory.
This will prevent decoding of PNG images.
</p>
<h2>Solution</h2>
<p>VLC media player 2.0.4 addresses this issue.
Patches for older versions are available
from the official VLC source code repository 2.0 and 1.1 branches.
</p>
<!--h2>Credits</h2>
<p>This vulnerability was reported by TBD.
</p-->
<h2>References</h2>
<dl>
<dt>The VideoLAN project</dt>
55
<dd><a href="//www.videolan.org/">http://www.videolan.org/</a>
56 57 58 59 60 61 62 63 64
</dd>
<dt>VLC official GIT repository</dt>
<dd><a href="http://git.videolan.org/?p=vlc.git;a=shortlog;h=b3b751cb99df71e3c0a18bcb38b4691cf98265fe">http://git.videolan.org/?p=vlc.git</a>
</dd>
</dl>
<h2>History</h2>
<dl>
<dt>14 October 2012</dt>
<dd>Patch for VLC development version.</dd>
Jean-Baptiste Kempf's avatar
Jean-Baptiste Kempf committed
65
<dt>15 October 2012</dt>
66 67 68 69
<dd>VLC media player 2.0.4 released.</dd>
<dt>2 November 2012</dt>
<dd>Security advisory published.</dd>
<dd>CVE reference.</dd>
70 71
<dt>3 November 2012</dt>
<dd>Security advisory updated.</dd>
72 73 74 75 76 77 78 79
</dl>

<address>R&eacute;mi Denis-Courmont,<br />
on behalf of the VideoLAN project</address>

</div>

<?php footer('$Id$'); ?>