CVE-2019-13602

An Integer Underflow in MP4_EIA608_Convert() in modules/demux/mp4/mp4.c in VideoLAN VLC media player through 3.0.7.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and crash) or possibly have unspecified other impact via a crafted .mp4 file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://git.videolan.org/?p=vlc.git;a=commit;h=b2b157076d9e94df34502dd8df0787deb940e938', 'name': 'https://git.videolan.org/?p=vlc.git;a=commit;h=b2b157076d9e94df34502dd8df0787deb940e938', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://git.videolan.org/?p=vlc.git;a=commit;h=8e8e0d72447f8378244f5b4a3dcde036dbeb1491', 'name': 'https://git.videolan.org/?p=vlc.git;a=commit;h=8e8e0d72447f8378244f5b4a3dcde036dbeb1491', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=8e8e0d72447f8378244f5b4a3dcde036dbeb1491 -
  • () https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=b2b157076d9e94df34502dd8df0787deb940e938 -

18 Apr 2022, 16:57

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 8.8
v2 : 6.8
v3 : 7.8
First Time Opensuse backports Sle
Debian debian Linux
Debian
Opensuse leap
Canonical ubuntu Linux
Canonical
Opensuse
References (BID) http://www.securityfocus.com/bid/109158 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/109158 - Broken Link
References (UBUNTU) https://usn.ubuntu.com/4074-1/ - (UBUNTU) https://usn.ubuntu.com/4074-1/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/201909-02 - (GENTOO) https://security.gentoo.org/glsa/201909-02 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/36 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/36 - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4504 - (DEBIAN) https://www.debian.org/security/2019/dsa-4504 - Third Party Advisory
CPE cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
CWE CWE-787

Information

Published : 2019-07-14 21:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-13602

Mitre link : CVE-2019-13602

CVE.ORG link : CVE-2019-13602


JSON object : View

Products Affected

videolan

  • vlc_media_player

opensuse

  • leap
  • backports_sle

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)

CWE-787

Out-of-bounds Write