SB2020051506 - Multiple vulnerabilities in VLC Media Player



SB2020051506 - Multiple vulnerabilities in VLC Media Player

Published: May 15, 2020

Security Bulletin ID SB2020051506
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 14% Medium 71% Low 14%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Uncontrolled Recursion (CVE-ID: CVE-2020-6071)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the compression pointer is followed without checking for recursion in the resource record-parsing functionality when parsing compressed labels in mDNS messages. A remote attacker can send a specially crafted mDNS message and cause a denial of service condition on the target system.


2) Unchecked Return Value (CVE-ID: CVE-2020-6072)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists within the label-parsing functionality due to the "rr_decode" function's return value is not checked when parsing compressed labels in mDNS messages. A remote attacker can send a specially crafted mDNS message and execute arbitrary code on the target system.


3) Integer overflow (CVE-ID: CVE-2020-6073)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in the TXT record-parsing functionality when parsing the RDATA section in a TXT record in mDNS messages. A remote attacker can send a specially crafted mDNS message, trigger integer overflow and cause a denial of service condition on the target system.



4) Out-of-bounds read (CVE-ID: CVE-2020-6077)

The vulnerability allows a remote attacker to perform a denial of service (DoS).

The vulnerability exists within the message-parsing functionality due to a boundary condition when parsing mDNS messages. A remote attacker can send a specially crafted mDNS message, trigger out-of-bounds read error and cause a denial of service condition on the target system.


5) Unchecked Return Value (CVE-ID: CVE-2020-6078)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists within the message-parsing functionality due to the "mdns_read_header" function is not checked when parsing mDNS messages in "mdns_recv". A remote attacker can send a specially crafted mDNS message and cause a denial of service condition on the target system.


6) Resource exhaustion (CVE-ID: CVE-2020-6079)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to encountering errors while parsing mDNS messages in the "rr_decode" function in the resource allocation handling. A remote attacker can send mDNS messages, trigger resource exhaustion and perform a denial of service (DoS) attack.


7) Out-of-bounds read (CVE-ID: CVE-2019-19721)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within DecodeBlock in sdl_image.c. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger a one byte out-of-bounds read error and read contents of memory on the system.


Remediation

Install update from vendor's website.