===================================================================== CERT-Renater Note d'Information No. 2011/VULN307 _____________________________________________________________________ DATE : 12/04/2011 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running VLC media player version 1.x.x prior to 1.1.9. ====================================================================== http://www.videolan.org/security/sa1103.html ______________________________________________________________________ Security Advisory 1103 Summary : Heap corruption in MP4 demultiplexer Date : April 2011 Affected versions : VLC media player 1.1.8 down to 1.0.0 ID : VideoLAN-SA-1103 CVE reference : Unassigned Details When parsing some MP4 (MPEG-4 Part 14) files, insufficient buffer size might lead to corruption of the heap. Impact If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player. Threat mitigation Exploitation of this issue requires the user to explicitly open an MP4 file with some specific content. Workarounds The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied. Alternatively, the MP4 decoder plugin (libmp4_plugin.*) can be removed manually from the VLC plugin installation directory. Solution VLC media player 1.1.9 will address this issue. Patches for older versions are available from the official VLC source code repositories. Credits This vulnerability was reported by Aliz Hammond. References The VideoLAN project http://www.videolan.org/ VLC official GIT repository http://git.videolan.org/?p=vlc.git;a=commit;h=5637ca8141bf39f263ecdb62035d2cb45c740821 History 7 April 2011 Vendor notified 9 April 2011 Patches published Security advisory published TBD CVE ID reserved VLC media player 1.1.9 released Rémi Denis-Courmont, on behalf of the VideoLAN project ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================