+
+
Security Bulletin VLC 3.0.18
+
+Summary : Multiple vulnerabilities fixed in VLC media player
+Date : November 2022
+Affected versions : VLC media player 3.0.17 and earlier
+ID : VideoLAN-SB-VLC-3018
+
+
+
Details
+
+- A denial of service could be triggered with a wrong mp4 file (div by 0) (#27202)
+- Fix crashes with multiple files due to double free (#26930)
+- A denial of service could be triggered with wrong oog file (null pointer dereference) (#27294)
+- Potential buffer overflow in the vnc module could trigger remote code execution if a malicious vnc URL is deliberately played (#27335, CVE-2022-41325)
+
+
+
Impact
+
If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.
+
While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or
+remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.
+
We have not seen exploits performing code execution through these vulnerability
+
+
+
Threat mitigation
+
Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.
+
+
Workarounds
+
The user should refrain from opening files from untrusted third parties
+or accessing untrusted remote sites (or disable the VLC browser plugins),
+until the patch is applied.
+
+
+
Solution
+
VLC media player 3.0.18 addresses the issue.
+
+
+
Credits
+
The vnc module vulnerability was reported and fixed by 0xMitsurugi from Synacktiv (#27335, CVE-2022-41325)
+
+
+
References
+
+- The VideoLAN project
+- http://www.videolan.org/
+
+- VLC official GIT repository
+- http://git.videolan.org/?p=vlc.git
+
+
+
+
+
+
=====================================
www.videolan.org/vlc/releases/3.0.18.php
=====================================
@@ -0,0 +1,561 @@
+
+