ID CVE-2007-6682
Summary Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
    cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 29-09-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2012-11-19T04:00:19.343-05:00
class vulnerability
contributors
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
definition_extensions
comment VLC media player is installed
oval oval:org.mitre.oval:def:11821
description Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
family windows
id oval:org.mitre.oval:def:14790
status accepted
submitted 2012-01-24T15:20:33.178-04:00
title Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d
version 6
refmap via4
bid 27015
bugtraq 20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d
confirm http://trac.videolan.org/vlc/changeset/23839
debian DSA-1543
exploit-db 5519
gentoo GLSA-200803-13
misc http://aluigi.altervista.org/adv/vlcboffs-adv.txt
osvdb 42208
secunia
  • 28233
  • 29284
  • 29766
sreason 3550
Last major update 29-09-2017 - 01:30
Published 17-01-2008 - 01:00
Last modified 29-09-2017 - 01:30
Back to Top