Search for vulnerabilities
Vulnerability details: VCID-xcjy-nav7-aaaa
Vulnerability ID VCID-xcjy-nav7-aaaa
Aliases CVE-2008-1881
Summary Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
Status Published
Exploitability 2.0
Weighted Severity 6.1
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.22677 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.22965 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.41711 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
epss 0.43005 https://api.first.org/data/v1/epss?cve=CVE-2008-1881
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2008-1881
Data source Exploit-DB
Date added March 13, 2008
Description VideoLAN VLC Media Player 0.8.6e - Subtitle Parsing Local Buffer Overflow
Ransomware campaign use Known
Source publication date March 14, 2008
Exploit type local
Platform windows
Source update date Nov. 23, 2016
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-1881
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96562
EPSS Score 0.22677
Published At Jan. 16, 2025, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.