First published: Mon Nov 10 2008(Updated: )
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VideoLAN VLC media player | =0.9 | |
VideoLAN VLC media player | =0.9.0 | |
VideoLAN VLC media player | =0.9.1 | |
VideoLAN VLC media player | =0.9.2 | |
VideoLAN VLC media player | =0.9.3 | |
VideoLAN VLC media player | =0.9.4 | |
VideoLAN VLC media player | =0.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5036 is classified as a medium severity vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2008-5036, upgrade to VLC media player version 0.9.6 or later.
CVE-2008-5036 affects VideoLAN VLC media player versions 0.9.0 to 0.9.5.
CVE-2008-5036 is associated with a stack-based buffer overflow attack through specially crafted subtitle files.
Yes, CVE-2008-5036 was split from a broader issue identified as CVE-2008-5032.