Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AANLkTin1HLGMUkuCk5Lhbaz1TD82mCW-ZsNtT2LyOm+N@mail.gmail.com>
Date: Thu, 26 Aug 2010 09:58:24 +0200
From: Geoffroy Couprie <geal@...eolan.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: VLC media player - DLL preloading vulnerability

On Thu, Aug 26, 2010 at 1:56 AM, Steven M. Christey
<coley@...us.mitre.org> wrote:
>
> We will have one CVE per vulnerable application.  Yes, it's going to be very
> painful.  Roughly, the rationale is: "the product does not protect against a
> common configuration/behavior in its environment."
>
>> VLC was exploitable by loading wintab32.dll, a component request by
>> Qt, as shown in http://www.exploit-db.com/exploits/14750/
>
> Use CVE-2010-3124

Thank you.

>
>
>> There's another possibility with DMO.
>
> Is this a distinct product outside of VLC, or is it just a different
> component / attack vector?
>

DMO stands for DirectX media objects. These are the codecs and video
filters used in DirectShow. So, potentially, all the applications
using external codecs or filters are vulnerable. And the issue with
wintab32.dll is caused by Qt, so developers using Qt should check
their applications.

Best regards,

-- 
Geoffroy Couprie
http://unhandledexpression.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.