CVE-2018-6360

Publication date 28 January 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted web site, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname. The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.

Status

Package Ubuntu Release Status
mpv 24.10 oracular
Fixed 0.27.2-1ubuntu1
24.04 LTS noble
Fixed 0.27.2-1ubuntu1
23.10 mantic
Fixed 0.27.2-1ubuntu1
23.04 lunar
Fixed 0.27.2-1ubuntu1
22.10 kinetic
Fixed 0.27.2-1ubuntu1
22.04 LTS jammy
Fixed 0.27.2-1ubuntu1
21.10 impish
Fixed 0.27.2-1ubuntu1
21.04 hirsute
Fixed 0.27.2-1ubuntu1
20.10 groovy
Fixed 0.27.2-1ubuntu1
20.04 LTS focal
Fixed 0.27.2-1ubuntu1
19.10 eoan
Fixed 0.27.2-1ubuntu1
19.04 disco
Fixed 0.27.2-1ubuntu1
18.10 cosmic
Fixed 0.27.2-1ubuntu1
18.04 LTS bionic
Fixed 0.27.2-1ubuntu1
17.10 artful Ignored end of life
16.04 LTS xenial
Vulnerable
14.04 LTS trusty Not in release

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H