9.3
CVSSv2

CVE-2008-5036

Published: 10/11/2008 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in VideoLAN VLC media player 0.9.x prior to 0.9.6 might allow user-assisted malicious users to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.

Vulnerable Product Search on Vulmon Subscribe to Product

videolan vlc media player 0.9.0

videolan vlc media player 0.9.4

videolan vlc media player 0.9.1

videolan vlc media player 0.9.5

videolan vlc media player 0.9.2

videolan vlc media player 0.9

videolan vlc media player 0.9.3

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::FIL ...
#!/usr/bin/perl # VLC Media Player < 096 RT File Buffer Overflow (Stack Based) # --------------------------------------------------------------- # Exploit by SkD <skdrat@hotmailcom> # # This should work on a fully up-to-date Windows XP SP3 If you want it to work # on your OS version, just find a "jmp esp" address in one of the dlls lo ...