===================================================================== CERT-Renater Note d'Information No. 2011/VULN064 _____________________________________________________________________ DATE : 28/01/2011 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running VLC media player versions prior to 1.1.6. ====================================================================== http://www.videolan.org/security/sa1101.html ______________________________________________________________________ Security Advisory 1101 Summary : Heap corruption in CDG decoder Date : January 2011 Affected versions : VLC media player 1.1.5 and earlier ID : VideoLAN-SA-1101 CVE reference : CVE-2011-0021 Details When parsing an invalid CDG file, insufficient boundary checks might lead to corruption of the heap. Impact If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player. Threat mitigation Exploitation of this issue requires the user to explicitly open a specially crafted file. Workarounds The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied. Alternatively, the CDG decoder plugin (libcdg_plugin.*) can be removed manually from the VLC plugin installation directory. Solution VLC media player 1.1.6 addresses this issue. Patches for older versions are available from the official VLC source code repositories. Credits This vulnerability was reported by Dan Rosenberg from VSR. References The VideoLAN project http://www.videolan.org/ VLC official GIT repository http://git.videolan.org/?p=vlc.git;a=commitdiff;h=6568965770f906d34d4aef83237842a5376adb55;hp=403718957b551c3c27546b7f82b2ae9ba937652f Dan Rosenberg, VSR http://www.vsecurity.com/ History 7 January 2011 Vendor notified 11 January 2011 Patches published 20 January 2011 CVE ID reserved 23 January 2011 VLC media player 1.1.6 released 25 January 2011 Security advisory published Rémi Denis-Courmont, on behalf of the VideoLAN project ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================