[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE id request: vlc
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-08-26 14:39:58
Message-ID: Pine.GSO.4.51.0808261039520.18466 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2008-3794
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794
Reference: MILW0RM:6293
Reference: URL:http://www.milw0rm.com/exploits/6293
Reference: MLIST:[oss-security] 20080824 Re: CVE id request: vlc
Reference: URL:http://www.openwall.com/lists/oss-security/2008/08/24/3
Reference: MLIST:[vlc-devel] 20080824 commit: MMS integers handling fixes, including buffer \
                overflow ( Rémi Denis-Courmont )
Reference: URL:http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html
Reference: MISC:http://www.orange-bat.com/adv/2008/adv.08.24.txt
Reference: BID:30806
Reference: URL:http://www.securityfocus.com/bid/30806

Integer signedness error in the mms_ReceiveCommand function in
modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote
attackers to execute arbitrary code via a crafted mmst link with a
negative size value, which bypasses a size check and triggers an
integer overflow followed by a stack-based buffer overflow.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic