=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.08.4.1000 vlc: Multiple vulnerabilities 4th August 2021 =========================================================================== Product: vlc Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-25804 CVE-2021-25803 CVE-2021-25802 CVE-2021-25801 Original Bulletin: https://www.debian.org/lts/security/2021/dla-2728 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running vlc check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2728-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb August 03, 2021 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : vlc Version : 3.0.11-0+deb9u2 CVE IDs : CVE-2021-25801 CVE-2021-25802 CVE-2021-25803 CVE-2021-25804 It was discovered that there were a number of issues in VideoLAN (aka 'vlc', a popular video and multimedia player: - - - CVE-2021-25801: A buffer overflow vulnerability in the __Parse_indx component allowed attackers to cause an out-of-bounds read via a crafted .avi file. - - - CVE-2021-25802: A buffer overflow vulnerability in the AVI_ExtractSubtitle component could have allowed attackers to cause an out-of-bounds read via a crafted .avi file. - - - CVE-2021-25803: A buffer overflow vulnerability in the vlc_input_attachment_New component allowed attackers to cause an out-of-bounds read via a specially-crafted .avi file. - - - CVE-2021-25804: A NULL-pointer dereference in "Open" in avi.c can result in a denial of service (DoS) vulnerability. For Debian 9 "Stretch", these problems have been fixed in version 3.0.11-0+deb9u2. We recommend that you upgrade your vlc packages. For the detailed security status of vlc, please refer to its security tracker page at: https://security-tracker.debian.org/tracker/vlc Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT