Search for vulnerabilities
Vulnerability details: VCID-fqaq-nwsz-ekfa
Vulnerability ID VCID-fqaq-nwsz-ekfa
Aliases CVE-2012-1775
Summary
Status Published
Exploitability 2.0
Weighted Severity 0.6
Risk 1.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added May 3, 2012
Description VideoLAN VLC Media Player 2.0.0 - Mms Stream Handling Buffer Overflow (Metasploit)
Ransomware campaign use Known
Source publication date May 3, 2012
Exploit type remote
Platform windows
Source update date Nov. 15, 2016
Data source Metasploit
Description This module exploits a buffer overflow in VLC media player VLC media player prior to 2.0.0. The vulnerability is due to a dangerous use of sprintf which can result in a stack buffer overflow when handling a malicious MMS URI. This module uses the browser as attack vector. A specially crafted MMS URI is used to trigger the overflow and get flow control through SEH overwrite. Control is transferred to code located in the heap through a standard heap spray. The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date March 15, 2012
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/vlc_mms_bof.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98277
EPSS Score 0.62287
Published At July 31, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T11:44:45.180142+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 37.0.0