Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-0531

EPSS 73.25% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-0531

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VideoLAN VLC媒体播放器输入验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VideoLAN VLC media player是法国VideoLAN组织开发的一款免费、开源的跨平台多媒体播放器(也是一个多媒体框架)。该产品支持播放多种介质(文件、光盘等)、多种音视频格式(WMV, MP3等)等。 VideoLAN VLC媒体播放器1.1.6.1及之前版本中的MKV分离器插件中的demux/mkv/mkv.hpp中存在输入验证漏洞。远程攻击者可以借助可触发内存破坏的特制MKV(WebM或者Matroska)文件导致拒绝服务(崩溃)并执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-0531

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-0531

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-02-07 · 10 CVEs total

CVE-2010-4506Oracle Passlogix v-GO Self-Service Password Reset和OEM加密问题漏洞
CVE-2011-0323Topaz Systems SigPlus Pro ActiveX Control多个远程代码执行漏洞
CVE-2011-0324Topaz Systems SigPlus Pro ActiveX Control多个堆缓冲区溢出漏洞
CVE-2011-0522VideoLAN VLC媒体播放器StripTags函数缓冲区溢出漏洞
CVE-2011-0899Drupal AES加密模块权限提升漏洞
CVE-2011-0900Terminal Server Client tsc_launch_remote函数栈缓冲区溢出漏洞
CVE-2011-0901Terminal Server Client tsc_launch_remote函数多个栈缓冲区溢出漏洞
CVE-2011-0902Sun Microsystems SunScreen Firewall Java Service多个不可信搜索路径漏洞
CVE-2011-0903Awcm-Cms AR Web Content Manager Cookie参数多个本地目录遍历漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-0531

No comments yet


Leave a comment