ID CVE-2007-6683
Summary The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*
    cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-09-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
oval via4
accepted 2012-11-19T04:00:14.947-05:00
class vulnerability
contributors
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
definition_extensions
comment VLC media player is installed
oval oval:org.mitre.oval:def:11821
description The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
family windows
id oval:org.mitre.oval:def:14619
status accepted
submitted 2012-01-24T15:20:33.178-04:00
title The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files
version 6
refmap via4
bid 28712
confirm
debian DSA-1543
gentoo GLSA-200803-13
mlist [vlc-devel] 20071226 Regarding "obscure" security problem
osvdb
  • 42205
  • 42206
secunia
  • 29284
  • 29766
Last major update 29-09-2017 - 01:30
Published 17-01-2008 - 01:00
Back to Top