A remote user could:
- Create a specifically crafted image file that could trigger an out of bounds read
If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.
While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.
We have not seen exploits performing code execution through these vulnerabilities
CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound
Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
@maintainer(s), please cleanup
Note that the microdns issues were handled in bug 714606.
For this bug, we have:
This issue was resolved and addressed in
GLSA 202005-11 at https://security.gentoo.org/glsa/202005-11
by GLSA coordinator Thomas Deutschmann (whissi).
The bug has been referenced in the following commit(s):
Author: Thomas Deutschmann <firstname.lastname@example.org>
AuthorDate: 2020-05-14 22:27:09 +0000
Commit: Thomas Deutschmann <email@example.com>
CommitDate: 2020-05-14 22:27:16 +0000
media-video/vlc: security cleanup
Package-Manager: Portage-2.3.99, Repoman-2.3.22
Signed-off-by: Thomas Deutschmann <firstname.lastname@example.org>
media-video/vlc/Manifest | 1 -
media-video/vlc/vlc-3.0.8-r1.ebuild | 489 ------------------------------------
2 files changed, 490 deletions(-)