First published: Wed Jan 16 2008(Updated: )
Heap-based buffer overflow in modules/access/rtsp/real_sdpplin.c in the Xine library, as used in VideoLAN VLC Media Player 0.8.6d and earlier, allows user-assisted remote attackers to cause a denial of service (crash) or execute arbitrary code via long Session Description Protocol (SDP) data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VideoLAN VLC media player | <=0.8.6d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0295 is considered a high-severity vulnerability due to the possibility of remote code execution and denial of service.
To fix CVE-2008-0295, upgrade to a version of VideoLAN VLC Media Player later than 0.8.6d.
CVE-2008-0295 facilitates user-assisted remote attacks that can result in denial of service or arbitrary code execution.
VLC Media Player versions up to and including 0.8.6d are affected by CVE-2008-0295.
Yes, a patch is available and users should upgrade to the latest version of VLC Media Player to mitigate CVE-2008-0295.