Vulnerability Description
The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Videolan | Vlc Media Player | < 2.1.6 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2015/01/20/5Mailing ListThird Party Advisory
- https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14PatchThird Party Advisory
- https://www.videolan.org/security/sa1501.htmlVendor Advisory
- http://openwall.com/lists/oss-security/2015/01/20/5Mailing ListThird Party Advisory
- https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14PatchThird Party Advisory
- https://www.videolan.org/security/sa1501.htmlVendor Advisory
FAQ
What is CVE-2014-9625?
CVE-2014-9625 is a vulnerability with a CVSS score of 7.8 (HIGH). The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote...
How severe is CVE-2014-9625?
CVE-2014-9625 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9625?
Check the references section above for vendor advisories and patch information. Affected products include: Videolan Vlc Media Player.