Name | CVE-2013-6933 |
Description | The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3156-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mplayer (PTS) | bullseye | 2:1.4+ds1-1+deb11u1 | fixed |
| bookworm | 2:1.5+svn38408-1 | fixed |
| sid, trixie | 2:1.5+svn38638-3 | fixed |
vlc (PTS) | bullseye (security), bullseye | 3.0.21-0+deb11u1 | fixed |
| bookworm, bookworm (security) | 3.0.21-0+deb12u1 | fixed |
| sid, trixie | 3.0.21-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - liblivemedia <not-affected> (vuln. code introduced in 2011.08.13)
[squeeze] - vlc <not-affected> (not built against vuln. liblivemedia)
[squeeze] - mplayer <no-dsa> (Minor issue)
- mplayer2 <not-affected> (b-d's on liblivemedia but doesn't actually build the support for it)
vlc fixed by binNMU 2.1.2-2+b1, but since binNMUs are not visible to the security tracker, the subsequent sid upload is tracked
for wheezy the version present at release of DSA 3156 is used (2.0.3-5+deb7u2), although strictly speaking it's 2.0.3-5+deb7u2+b1