First published: Thu Dec 06 2007(Updated: )
A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a "bad initialized pointer," aka a "recursive plugin release vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VideoLAN VLC media player | =0.8.6b | |
VideoLAN VLC media player | =0.8.6 | |
VideoLAN VLC media player | =0.8.6a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6262 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-6262, you should update to VLC media player version 0.8.6d or later.
The affected software versions for CVE-2007-6262 include VLC media player 0.8.6, 0.8.6a, and 0.8.6b.
Exploiting CVE-2007-6262 could allow an attacker to execute arbitrary code on the victim's machine.
CVE-2007-6262 primarily affects Windows platforms where VLC media player is installed.