Description
Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.
Exploits (1)
References (10)
Core 10
Core References
Exploit x_refsource_misc
http://www.orange-bat.com/adv/2008/adv.08.24.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30806
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14531
Various Sources mailing-list
x_refsource_mlist
http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6293
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44659
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1020759
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4190
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2008/08/24/3
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200809-06.xml
Scores
EPSS
0.0920
EPSS Percentile
92.7%
Details
CWE
CWE-189
Status
published
Products (1)
videolan/vlc_media_player
0.8.6i
Published
Aug 26, 2008
Tracked Since
Feb 18, 2026