Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEDdjHeAEqU8DSwj8krZC5=puZWTOc_8Pe16Li+EVqLsLfh4=A@mail.gmail.com>
Date: Thu, 3 Oct 2013 21:52:13 +0100
From: Pedro Ribeiro <pedrib@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - VLC 2.0.0 to 2.0.8

On 1 October 2013 16:20, Pedro Ribeiro <pedrib@...il.com> wrote:
> Hi,
>
> I have discovered a denial of service / possible code execution in VLC via a
> crafted ASF file. This has been reported to VLC and was apparently fixed
> unintentionally in 2.0.8 with the entry "Improve handling of corrupt ASF
> files". Version 2.1.0 is not affected.
>
> The file contains a crafted ASF packet that causes VLC to crash on a read
> operation, with control of EDI and EAX. In the file attached you will find
> at starting offset 0x157AD the hex values 17 DE B4 71 in little endian,
> which attempts to use for a read operation. Control of other variables in
> the Demux function in asf.c is also possible by changing packet values
> before and after the offset as per the ASF specification.
>
> The file is located here:
> https://github.com/pedrib/PoC/blob/master/vlc-crash.asf
>
> I have not been able to obtain any program control so far, so at the moment
> this only crashes VLC. However someone more skilled might be able to control
> it.
>
> Can you please provide a CVE for this?
>
> Regards
> Pedro


Hi,

Do you need more information on this, do not consider it CVE-worthy or
just swamped with work at the moment? :)

Regards,
Pedro

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.