|Check Point Reference:||CPAI-2012-796|
|Date Published:||13 Jan 2013|
|Protection Provided by:||
|Who is Vulnerable?|| VideoLAN VLC Media Player 2.0.3 and prior |
|Vulnerability Description||A buffer overread vulnerability has been reported in VideoLAN VLC Media Player.|
|Vulnerability Details||The vulnerability is due to an input validation error when handling certain PNG files. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted PNG file with an affected version of VLC Media Player. Successful exploitation would allow the attacker to execute arbitrary code on the target.|
This protection will detect and block malicious PNG files.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
- In the IPS tab, click Protections and find the VideoLAN VLC Media Player PNG Code Execution protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
SmartView Tracker will log the following entries:
Attack Name: Media Player Enforcement Violation
Attack Information: VideoLAN VLC Media Player PNG Code Execution