First published: Wed Jul 10 2013(Updated: )
** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating "This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine." A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VLC Media Player | =2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3245 is classified as a potential denial of service vulnerability which could lead to application crashes.
Fixing CVE-2013-3245 involves updating VLC Media Player to the latest version released after 2.0.7.
CVE-2013-3245 specifically affects VideoLAN VLC Media Player version 2.0.7 and possibly other versions.
Yes, CVE-2013-3245 could potentially allow remote attackers to execute arbitrary code through crafted MKV files.
Attackers can exploit CVE-2013-3245 by delivering a specially crafted MKV file to the target user, which may cause a crash or unintended code execution.