CVE-2018-19857

Published: Dic 05, 2018 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2018-11532 Aliases: GSD-2018-19857
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,1
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: high
MEDIUM 6,4
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: partial

Description

AI Translation Available

The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0149
Percentile
0,8th
Updated

EPSS Score Trend (Last 91 Days)

824

Access of Uninitialized Pointer

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Availability Integrity
Potential Impacts:
Read Memory Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Application

Vlc Media Player by Videolan

cpe:2.3:a:videolan:vlc_media_player:3.0.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html
https://dyntopia.com/advisories/013-vlc
Exploit Third Party Advisory
https://dyntopia.com/advisories/013-vlc
https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15d…
https://usn.ubuntu.com/4074-1/
https://www.debian.org/security/2019/dsa-4366
http://www.securityfocus.com/bid/106130
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106130
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html
https://dyntopia.com/advisories/013-vlc
Exploit Third Party Advisory
https://dyntopia.com/advisories/013-vlc
https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15d…
https://usn.ubuntu.com/4074-1/
https://www.debian.org/security/2019/dsa-4366
http://www.securityfocus.com/bid/106130
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106130