Summary
The host is installed with VLC media player
and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will allow
attacker to execute an arbitrary code within the context of the VLC media player and potentially compromise a user's system.
Impact Level: System/Application
Solution
Upgrade to VideoLAN VLC media player
version 1.0.1 or later. For updates refer http://www.videolan.org/
Insight
The error exists due to an integer
underflow in the 'real_get_rdt_chunk' function within modules/access/rtsp/real.c script.
Affected
VideoLAN VLC media player before 1.0.1
on Linux.
Detection
Get the installed version with the help
of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2010-2062 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Win)
- ACDSee FotoSlate PLP Multiple Buffer Overflow Vulnerabilities
- CA Internet Security Suite Plus 'KmxSbx.sys' Buffer Overflow Vulnerability
- avast! 'aswRdr.sys' Buffer Overflow Vulnerability
- Cyrus IMAP Server 'split_wildmats()' Remote Buffer Overflow Vulnerability