CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

漏洞编号:VideoLAN VLC媒体播放器字幕远程代码执行漏洞

2017年5月28日 2337点热度 0人点赞 0条评论

漏洞类别:Local

漏洞等级:

漏洞信息

VLC media player is a portable, free and open-source, cross-platform media player and streaming media server written by the VideoLAN project. An unauthenticated remote attacker can upload a specially crafted Subtitles file to the online repository that, when loaded by VLC users, triggers an arbitrary code execution.

Affected Version
VLC Media Player versions prior to 2.2.5.1

Detection Logic(Authenticated):
This QID checks for VLC Media Player versions less than 2.2.5.1

漏洞危害

On successful exploitation it allows remote attackers to execute arbitrary code via a crafted subtitles file.

解决方案

Customers are advised to download the latest version from VLC Media Player Download Page

Patch:
Following are links for downloading patches to fix the vulnerabilities:

VLC 2.2.5.1

0daybank

标签: 暂无
最后更新:2017年6月7日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me