module

VLC AMV Dangling Pointer Vulnerability

Disclosed
2011-03-23
Created
2018-05-30

Description

This module exploits VLC media player when handling a .AMV file. By flipping
the 0x41st byte in the file format (video width/height), VLC crashes due to an
invalid pointer, which allows remote attackers to gain arbitrary code execution.
The vulnerable packages include: VLC 1.1.4, VLC 1.1.5, VLC 1.1.6, VLC 1.1.7. Also,
please note that IE 8 targets require Java support in order to run properly.

Author

sinn3r sinn3r@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/browser/vlc_amv
msf exploit(vlc_amv) > show targets
...targets...
msf exploit(vlc_amv) > set TARGET < target-id >
msf exploit(vlc_amv) > show options
...show and set options...
msf exploit(vlc_amv) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.