# N/A
## 概述
`mmstu.c` 文件中存在越界读取漏洞,存在于 VideoLAN VLC media player 3.0.22 之前的版本中,攻击者可利用恶意构造的 MMS 服务器 0x01 响应导致拒绝服务。
## 影响版本
VideoLAN VLC media player 3.0.22 之前的版本
## 细节
漏洞位于 `mmstu.c` 模块,处理 MMS 服务器返回的 0x01 响应时未正确验证数据边界,导致越界读取。
## 影响
可引发越界读取,进而造成程序崩溃,实现拒绝服务(DoS)。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: VideoLAN Security Bulletin VLC 3.0.22 - VideoLAN -- 🔗来源链接
标签:
神龙速读:
- **Summary**: Multiple vulnerabilities fixed in VLC media player
- **Date**: December 2025
- **Affected versions**: VLC media player 3.0.21 and earlier
- **ID**: VideoLAN-SB-VLC-3022
- **CVE references**: CVE-2025-51602
- **Impact**:
- Denial of service could be triggered with maliciously crafted files or streams.
- Potential for remote code execution through exploitation of vulnerabilities.
- **Threat mitigation**: Exploitation requires user to open maliciously crafted files.
- **Workarounds**: Refrain from opening untrusted files until patch is applied.
- **Solution**: VLC media player 3.0.22 addresses these issues.
- **Credits**: Multiple contributors reported vulnerabilities and fixes.
- **References**: Reference to VideoLAN and VLC Git repositories provided.
标题: Not Found -- 🔗来源链接
标签:
神龙速读:
- **HTTP Status Code**: 404 (Page Not Found)
- **Message**: Page not found, address might be incorrect or page moved.
- **Platform**: GitLab
- **Action Suggestion**: Contact the GitLab administrator if you believe this is an error.
- **Search Option**: Search functionality available for projects, issues, etc.
- **Navigation Links**: Home, Sign In/Register, Help
No specific vulnerability information is visible from this error page. It is just a standard 404 error page.
暂无评论