Search for vulnerabilities
Vulnerability details: VCID-app2-g9cd-aaam
Vulnerability ID VCID-app2-g9cd-aaam
Aliases CVE-2008-3732
Summary Integer overflow in the Open function in modules/demux/tta.c in VLC Media Player 0.8.6i allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TTA file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
Status Published
Exploitability 2.0
Weighted Severity 8.4
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.09818 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.16768 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.16768 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.16768 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.2514 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
epss 0.29643 https://api.first.org/data/v1/epss?cve=CVE-2008-3732
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2008-3732
Data source Exploit-DB
Date added Aug. 15, 2008
Description VideoLAN VLC Media Player 0.8.6i - '.tta' File Parsing Heap Overflow (PoC)
Ransomware campaign use Known
Source publication date Aug. 16, 2008
Exploit type dos
Platform multiple
Source update date Nov. 23, 2016
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-3732
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.95016
EPSS Score 0.09818
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.