CVE-2008-5036

Videolan Vlc Media Player - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/18548
exploitdb WORKING POC VERIFIED
by SkD · perllocalwindows
https://www.exploit-db.com/exploits/7051
metasploit WORKING POC GOOD
by Tobias Klein, SkD, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/vlc_realtext.rb

Scores

EPSS 0.6645
EPSS Percentile 98.5%

Details

CWE
CWE-119
Status published
Products (7)
videolan/vlc_media_player 0.9
videolan/vlc_media_player 0.9.0
videolan/vlc_media_player 0.9.1
videolan/vlc_media_player 0.9.2
videolan/vlc_media_player 0.9.3
videolan/vlc_media_player 0.9.4
videolan/vlc_media_player 0.9.5
Published Nov 10, 2008
Tracked Since Feb 18, 2026