First published: Tue Dec 06 2022(Updated: )
An integer overflow in the VNC module in VideoLAN VLC Media Player through 3.0.17.4 allows attackers, by tricking a user into opening a crafted playlist or connecting to a rogue VNC server, to crash VLC or execute code under some conditions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Videolan Vlc Media Player | <=3.0.17.4 | |
Debian Debian Linux | =11.0 | |
debian/vlc | <=3.0.17.4-0+deb10u1 | 3.0.17.4-0+deb10u2 3.0.18-0+deb11u1 3.0.18-2 3.0.19-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41325 is an integer overflow vulnerability in the VNC module of VideoLAN VLC Media Player through version 3.0.17.4.
CVE-2022-41325 can be exploited by tricking a user into opening a crafted playlist or connecting to a rogue VNC server, which can cause VLC to crash or execute arbitrary code.
Yes, Videolan VLC Media Player through version 3.0.17.4 is affected by CVE-2022-41325.
Yes, Debian Linux version 11.0 is affected by CVE-2022-41325.
To fix CVE-2022-41325, users should update to the latest version of VideoLAN VLC Media Player or apply the relevant security patches provided by Debian.