6.8
CVSSv2

CVE-2007-0017

Published: 03/01/2007 Updated: 11/10/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 up to and including 0.8.6 allow user-assisted remote malicious users to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file.

Vulnerable Product Search on Vulmon Subscribe to Product

videolan vlc media player 0.7.1

videolan vlc media player 0.7.2

videolan vlc media player 0.8.4a

videolan vlc media player 0.8.2

videolan vlc media player 0.8.4

videolan vlc media player 0.7.0

videolan vlc media player 0.8.5

videolan vlc media player 0.8.6

videolan vlc media player 0.8.0

videolan vlc media player 0.8.1

Vendor Advisories

Debian Bug report logs - #405425 FrSIRT/ADV-2007-0026: vlc: "cdio_log_handler()" and "vcd_log_handler()" Format String Vulnerabilities Package: vlc; Maintainer for vlc is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for vlc is src:vlc (PTS, buildd, popcon) Reported by: Alex de Oliveira Silva &lt ...
Kevin Finisterre discovered several format string problems in vlc, a multimedia player and streamer, that could lead to the execution of arbitrary code For the stable distribution (sarge) this problem has been fixed in version 081svn20050314-1sarge2 For the testing distribution (etch) this problem has been fixed in version 086-svn20061012de ...

Exploits

#!/usr/bin/perl # # wwwdigitalmunitioncom/VLCMediaSlayer-ppcpl # Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com # # This is just a vanilla format string exploit for OSX on ppc We overwrite a saved return addy with our shellcode address # This code currently overwrites the saved return addy with the stack location of our sh ...
#!/usr/bin/perl # # wwwdigitalmunitioncom/VLCMediaSlayer-x86pl # Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com # # This exploit will create a malicious m3u file that will cause VLC Player for OSX to execute arbitrary code # $outfile = "pwnagem3u"; $bindshell = "\x6a\x42\x58\xcd\x80\x6a\x61\x58\x99\x52\x68\x10\x02\x11\x ...