Vulnerabilities > CVE-2014-1684 - Numeric Errors vulnerability in Videolan VLC Media Player

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
videolan
CWE-189
nessus
exploit available

Summary

The ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in the ASF Demuxer in VideoLAN VLC Media Player before 2.1.3 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.

Vulnerable Configurations

Part Description Count
Application
Videolan
114

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionVLC 2.1.2 - (.asf) Crash PoC. CVE-2014-1684 . Dos exploits for multiple platform
idEDB-ID:31429
last seen2016-02-03
modified2014-02-05
published2014-02-05
reporterSaif
sourcehttps://www.exploit-db.com/download/31429/
titleVLC 2.1.2 - .asf Crash PoC

Nessus

  • NASL familyWindows
    NASL idVLC_2_1_3.NASL
    descriptionAn exploitable denial of service vulnerability exists in ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in the ASF Demuxer in VideoLAN VLC Media Player before 2.1.3. Allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.
    last seen2020-06-12
    modified2020-06-11
    plugin id137357
    published2020-06-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137357
    titleVLC < 2.1.3 DoS Vulnerability
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(137357);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/17");
    
      script_cve_id("CVE-2014-1684");
      script_bugtraq_id(65399);
    
      script_name(english:"VLC < 2.1.3 DoS Vulnerability");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a media player that is affected by denial of service vulnerability.");
      script_set_attribute(attribute:"description", value:
    "An exploitable denial of service vulnerability exists in ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in 
    the ASF Demuxer in VideoLAN VLC Media Player before 2.1.3. Allows remote attackers to cause a denial of service 
    (divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.");
      script_set_attribute(attribute:"see_also", value:"https://www.cvedetails.com/cve/CVE-2014-1684");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to VLC version 2.1.3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-1684");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/03");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/03/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/06/11");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:videolan:vlc_media_player");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("vlc_installed.nasl");
      script_require_keys("SMB/VLC/Version", "installed_sw/VLC media player");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    app_info = vcf::get_app_info(app:'VLC media player', win_local:TRUE);
    
    constraints = [{'fixed_version':'2.1.3'}];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201603-08.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201603-08 (VLC: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VLC. Please review the CVE identifiers referenced below for details. Impact : Remote attackers could possibly execute arbitrary code or cause Denial of Service. Workaround : There is no known work around at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id89901
    published2016-03-14
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/89901
    titleGLSA-201603-08 : VLC: Multiple vulnerabilities

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/125080/asf-poc.py.txt
idPACKETSTORM:125080
last seen2016-12-05
published2014-02-06
reporterSaif El-Sherei
sourcehttps://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html
titleVLC Media Player 2.1.2 Denial Of Service