Vulnerability Details : CVE-2017-8311
Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2017-8311
Top countries where our scanners detected CVE-2017-8311
Top open port discovered on systems with this issue 80
IPs affected by CVE-2017-8311 73
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2017-8311!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-8311
Probability of exploitation activity in the next 30 days: 10.18%
CVSS scores for CVE-2017-8311
|Base Score||Base Severity||CVSS Vector||Exploitability Score||Impact Score||Source|
CWE ids for CVE-2017-8311
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: firstname.lastname@example.org (Primary)
References for CVE-2017-8311
Debian -- Security Information -- DSA-3899-1 vlc
VLC Media Player/Kodi/PopcornTime 'Red Chimera' < 2.2.5 - Memory Corruption (PoC)
git.videolan.org Git - vlc.git/commitdiffPatch
VideoLAN VLC CVE-2017-8311 Heap Based Buffer Overflow Vulnerability
VLC: Multiple vulnerabilities (GLSA 201707-10) — Gentoo security