Vulnerability Details : CVE-2007-6683
The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
Products affected by CVE-2007-6683
- cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-6683
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-6683
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2007-6683
-
http://www.securityfocus.com/bid/28712
-
http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
VLC: Multiple vulnerabilities (GLSA 200803-13) — Gentoo security
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619
404 Not Found
-
http://www.debian.org/security/2008/dsa-1543
[SECURITY] [DSA 1543-1] New vlc packages fix several vulnerabilities
-
https://trac.videolan.org/vlc/ticket/1371
Security issue: browser plugins input (#1371) · Issues · VideoLAN / VLC · GitLab
-
http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html
[vlc-devel] Is "live.patch" still needed?Exploit
-
https://trac.videolan.org/vlc/changeset/23197
Jump to