vmnc.dll in the VMnc media codec in VMware Movie Decoder before 6.5.4 Build 246459 on Windows, and the movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Windows, allows remote attackers to execute arbitrary code via an AVI file with crafted HexTile-encoded video chunks that trigger heap-based buffer overflows, related to "integer truncation errors."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://secunia.com/advisories/39206 | third party advisory vendor advisory |
http://lists.vmware.com/pipermail/security-announce/2010/000090.html | mailing list patch |
http://secunia.com/advisories/36712 | third party advisory vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | mailing list |
http://www.vmware.com/security/advisories/VMSA-2010-0007.html | patch |
http://www.osvdb.org/63615 | vdb entry |
http://secunia.com/secunia_research/2009-37/ | vendor advisory |
http://www.securitytracker.com/id?1023838 | vdb entry |
http://www.securityfocus.com/bid/39364 | vdb entry |
http://secunia.com/advisories/39215 | third party advisory vendor advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | mailing list |