Vigil@nce: VLC media player, integer overflow of RealMedia
December 2008 by Vigil@nce
SYNTHESIS
An attacker can invite the victim to open a malicious RealMedia
file with the VLC media player in order to execute code on his
computer.
Gravity: 2/4
Consequences: user access/rights
Provenance: document
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 01/12/2008
IMPACTED PRODUCTS
– Unix - plateform
DESCRIPTION
The VideoLAN VLC program displays multimedia documents.
The libreal_plugin plugin opens documents in the RealMedia (.rm)
format.
The ReadRealIndex() function of the modules/demux/real.c file does
not check a value from the RealMedia header, and uses it as a
counter which overflows.
A RealMedia file can then corrupt the memory in order to execute
code.
CHARACTERISTICS
Identifiers: BID-32545, CVE-2008-5276, TKADV2008-013,
VideoLAN-SA-0811, VIGILANCE-VUL-8273