Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Apr 2020 18:48:51 +0000 (UTC)
From:      "Tobias C. Berner" <tcberner@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r533382 - head/security/vuxml
Message-ID:  <202004291848.03TImpBg010772@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: tcberner
Date: Wed Apr 29 18:48:50 2020
New Revision: 533382
URL: https://svnweb.freebsd.org/changeset/ports/533382

Log:
  Document multimedia/vlc vulnerabilities
  
  Security:	CVE-2019-19721 CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077 CVE-2020-6078 CVE-2020-6079

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Apr 29 17:17:52 2020	(r533381)
+++ head/security/vuxml/vuln.xml	Wed Apr 29 18:48:50 2020	(r533382)
@@ -58,6 +58,44 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="4a10902f-8a48-11ea-8668-e0d55e2a8bf9">
+    <topic>vlc -- Multiple vulnerabilities fixed in VLC media player</topic>
+    <affects>
+      <package>
+	<name>vlc</name>
+	<range><lt>3.0.10,4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>VideoLAN reports:</p>
+	<blockquote cite="https://www.videolan.org/security/sb-vlc309.html">;
+	  <h3>Details</h3>
+	  <p>    A remote user could:</p>
+	  <ul>
+	    <li>  Create a specifically crafted image file that could trigger an out of bounds read </li>
+	    <li> Send a specifically crafter request to the microdns service discovery, potentially triggering various memory management issues</li>
+	    </ul>
+	<h3>Impact</h3>
+      <p>
+If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.
+	</p><p>
+	  While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.</p>
+	<p>
+	    We have not seen exploits performing code execution through these vulnerabilities</p>
+	  <p>CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.videolan.org/security/sb-vlc309.html</url>;
+    </references>
+    <dates>
+      <discovery>2020-04-01</discovery>
+      <entry>2020-04-29</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3c7911c9-8a29-11ea-8d8c-005056a311d1">
     <topic>samba -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202004291848.03TImpBg010772>