Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
References
Link | Resource |
---|---|
http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201707-10 | Third Party Advisory |
http://www.securityfocus.com/bid/98631 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2017/dsa-3899 | Third Party Advisory |
Information
Published : 2017-05-23 14:29
Updated : 2018-10-17 09:53
NVD link : CVE-2017-8312
Mitre link : CVE-2017-8312
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
videolan
- vlc_media_player