module
VLC AMV Dangling Pointer Vulnerability
Disclosed | Created |
---|---|
2011-03-23 | 2018-05-30 |
Disclosed
2011-03-23
Created
2018-05-30
Description
This module exploits VLC media player when handling a .AMV file. By flipping
the 0x41st byte in the file format (video width/height), VLC crashes due to an
invalid pointer, which allows remote attackers to gain arbitrary code execution.
The vulnerable packages include: VLC 1.1.4, VLC 1.1.5, VLC 1.1.6, VLC 1.1.7. Also,
please note that IE 8 targets require Java support in order to run properly.
the 0x41st byte in the file format (video width/height), VLC crashes due to an
invalid pointer, which allows remote attackers to gain arbitrary code execution.
The vulnerable packages include: VLC 1.1.4, VLC 1.1.5, VLC 1.1.6, VLC 1.1.7. Also,
please note that IE 8 targets require Java support in order to run properly.
Author
sinn3r sinn3r@metasploit.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.