First published: Wed Oct 23 2019(Updated: )
When executing VideoLAN VLC media player 3.0.8 with libqt on Windows, Data from a Faulting Address controls Code Flow starting at libqt_plugin!vlc_entry_license__3_0_0f+0x00000000003b9aba. NOTE: the VideoLAN security team indicates that they have not been contacted, and have no way of reproducing this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Videolan Vlc Media Player | =3.0.8 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-18278 is high with a severity value of 7.8.
Videolan VLC media player version 3.0.8 is affected by CVE-2019-18278.
CVE-2019-18278 allows an attacker to control the code flow when executing Videolan VLC media player 3.0.8 with libqt on Windows.
No, Microsoft Windows is not vulnerable to CVE-2019-18278.
You can find more information about CVE-2019-18278 at [this link](https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html).