Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CVE Program Container", "references": [{"url": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "http://www.securityfocus.com/bid/61032", "name": "61032", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/71", "name": "20130710 VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"]}, {"url": "http://secunia.com/advisories/52956", "name": "52956", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/77", "name": "20130710 Re: VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/79", "name": "20130710 Re: VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"]}, {"url": "http://secunia.com/blog/372/", "tags": ["x_refsource_MISC", "x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T16:00:10.117Z"}}, {"title": "CISA ADP Vulnrichment", "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}}, {"other": {"type": "ssvc", "content": {"id": "CVE-2013-3245", "role": "CISA Coordinator", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-04-22T20:20:26.210080Z"}}}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read"}]}, {"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow"}]}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-04-22T20:19:35.894Z"}}], "cna": {"tags": ["disputed"], "affected": [{"vendor": "n/a", "product": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "references": [{"url": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia", "tags": ["x_refsource_MISC"]}, {"url": "http://www.securityfocus.com/bid/61032", "name": "61032", "tags": ["vdb-entry", "x_refsource_BID"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/71", "name": "20130710 VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC"]}, {"url": "http://secunia.com/advisories/52956", "name": "52956", "tags": ["third-party-advisory", "x_refsource_SECUNIA"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/77", "name": "20130710 Re: VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC"]}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/79", "name": "20130710 Re: VLC media player MKV Parsing POC", "tags": ["mailing-list", "x_refsource_FULLDISC"]}, {"url": "http://secunia.com/blog/372/", "tags": ["x_refsource_MISC"]}], "descriptions": [{"lang": "en", "value": "plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow"}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "text", "description": "n/a"}]}], "providerMetadata": {"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera", "dateUpdated": "2013-07-10T19:00:00Z"}, "x_legacyV4Record": {"affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "n/a"}]}, "product_name": "n/a"}]}, "vendor_name": "n/a"}]}}, "data_type": "CVE", "references": {"reference_data": [{"url": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia", "name": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia", "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/61032", "name": "61032", "refsource": "BID"}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/71", "name": "20130710 VLC media player MKV Parsing POC", "refsource": "FULLDISC"}, {"url": "http://secunia.com/advisories/52956", "name": "52956", "refsource": "SECUNIA"}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/77", "name": "20130710 Re: VLC media player MKV Parsing POC", "refsource": "FULLDISC"}, {"url": "http://seclists.org/fulldisclosure/2013/Jul/79", "name": "20130710 Re: VLC media player MKV Parsing POC", "refsource": "FULLDISC"}, {"url": "http://secunia.com/blog/372/", "name": "http://secunia.com/blog/372/", "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "eng", "value": "** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2013-3245", "STATE": "PUBLIC", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com"}}}}, "cveMetadata": {"cveId": "CVE-2013-3245", "state": "PUBLISHED", "dateUpdated": "2024-09-16T16:58:28.941Z", "dateReserved": "2013-04-22T00:00:00Z", "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "datePublished": "2013-07-10T19:00:00Z", "assignerShortName": "flexera"}, "dataVersion": "5.1"}