Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEDdjHcVFxP7zQvMfy8Zmsir4irMggyr+4QOJecWpAzrnZfjYQ@mail.gmail.com>
Date: Tue, 1 Oct 2013 16:20:10 +0100
From: Pedro Ribeiro <pedrib@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request - VLC 2.0.0 to 2.0.8

Hi,

I have discovered a denial of service / possible code execution in VLC via
a crafted ASF file. This has been reported to VLC and was apparently fixed
unintentionally in 2.0.8 with the entry "Improve handling of corrupt ASF
files". Version 2.1.0 is not affected.

The file contains a crafted ASF packet that causes VLC to crash on a read
operation, with control of EDI and EAX. In the file attached you will find
at starting offset 0x157AD the hex values 17 DE B4 71 in little endian,
which attempts to use for a read operation. Control of other variables in
the Demux function in asf.c is also possible by changing packet values
before and after the offset as per the ASF specification.

The file is located here:
https://github.com/pedrib/PoC/blob/master/vlc-crash.asf

I have not been able to obtain any program control so far, so at the moment
this only crashes VLC. However someone more skilled might be able to
control it.

Can you please provide a CVE for this?

Regards
Pedro

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.