Commit 3d244a69 authored by Hugo Beauzée-Luyssen's avatar Hugo Beauzée-Luyssen


parent a2bfccbc
......@@ -16,6 +16,14 @@ for underlying third party libraries.
Please refer to the concerned third parties as appropriate.
<dd>Buffer overflow in avi demuxer &amp; heap use after free in mkv demuxer
<a href="sa1901.html">Details</a>
$title = "VideoLAN Security Advisory 1901";
$lang = "en";
$menu = array( "vlc" );
$body_color = "red";
<div id="fullwidth">
<h1>Security Advisory 1901</h1>
Summary : Read buffer overflow &amp; use-after-free
Date : June 2019
Affected versions : VLC media player 3.0.6 and earlier
ID : VideoLAN-SA-1901
CVE reference : CVE-2019-5439, CVE-2019-12874
<p>A remote user can create some specially crafted avi or mkv files that, when loaded by the target user, will trigger a
heap buffer overflow (read) in ReadFrame (demux/avi/avi.c), or a
heap use after free in zlib_decompress_extra() (demux/mkv/utils.cpp) respectively</p>
<p>If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.</p>
<h2>Threat mitigation</h2>
<p>Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.</p>
<p>ASLR and DEP help reduce exposure, but may be bypassed.</p>
<p>The user should refrain from opening files from untrusted third parties
or accessing untrusted remote sites (or disable the VLC browser plugins),
until the patch is applied.
<p>VLC media player <b>3.0.7</b> addresses the issue.
<dt>The VideoLAN project</dt>
<dd><a href="//"></a>
<dt>VLC official GIT repository</dt>
<dd><a href=""></a>
<?php footer('$Id$'); ?>
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment