Search for vulnerabilities
Vulnerability details: VCID-cwnt-cxte-aaas
Vulnerability ID VCID-cwnt-cxte-aaas
Aliases CVE-2008-3794
Summary Integer signedness error in the mms_ReceiveCommand function in modules/access/mms/mmstu.c in VLC Media Player 0.8.6i allows remote attackers to execute arbitrary code via a crafted mmst link with a negative size value, which bypasses a size check and triggers an integer overflow followed by a heap-based buffer overflow.
Status Published
Exploitability 2.0
Weighted Severity 6.1
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.08916 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.11328 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.14360 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.14360 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.14360 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
epss 0.15154 https://api.first.org/data/v1/epss?cve=CVE-2008-3794
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2008-3794
Data source Exploit-DB
Date added Aug. 22, 2008
Description VideoLAN VLC Media Player 0.8.6i - Mms Protocol Handling Heap Overflow (PoC)
Ransomware campaign use Known
Source publication date Aug. 23, 2008
Exploit type dos
Platform multiple
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-3794
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.91775
EPSS Score 0.08916
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.