Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 allows remote attackers to execute arbitrary code via a crafted MMS:// stream.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 allows remote attackers to execute arbitrary code via a crafted MMS:// stream.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/53391 | vdb-entry x_refsource_BID |
| http://www.exploit-db.com/exploits/18825 | exploit x_refsource_EXPLOIT-DB |
| http://www.securityfocus.com/bid/52550 | vdb-entry x_refsource_BID |
| http://www.videolan.org/security/sa1201.html | x_refsource_CONFIRM |
| http://git.videolan.org/?p=vlc/vlc-2.0.git%3Ba=commit%3Bh=11a95cce96fffdbaba1be6034d7b42721667821c | x_refsource_CONFIRM |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14820 | vdb-entry signature x_refsource_OVAL |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/53391 | vdb-entry x_refsource_BID x_transferred |
| http://www.exploit-db.com/exploits/18825 | exploit x_refsource_EXPLOIT-DB x_transferred |
| http://www.securityfocus.com/bid/52550 | vdb-entry x_refsource_BID x_transferred |
| http://www.videolan.org/security/sa1201.html | x_refsource_CONFIRM x_transferred |
| http://git.videolan.org/?p=vlc/vlc-2.0.git%3Ba=commit%3Bh=11a95cce96fffdbaba1be6034d7b42721667821c | x_refsource_CONFIRM x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14820 | vdb-entry signature x_refsource_OVAL x_transferred |
Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 allows remote attackers to execute arbitrary code via a crafted MMS:// stream.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |