VLC media player: Format string vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200707-12 / vlc
||July 28, 2007
||July 28, 2007: 01
All supported architectures
A vulnerability has been discovered in VLC media player, allowing for the
remote execution of arbitrary code.
VLC media player is a multimedia player for various audio and video
David Thiel from iSEC Partners Inc. discovered format string errors in
various plugins when parsing data. The affected plugins include Vorbis,
Theora, CDDA and SAP.
A remote attacker could entice a user to open a specially crafted media
file, possibly resulting in the execution of arbitrary code with the
privileges of the user running VLC media player.
There is no known workaround at this time.
All VLC media player users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6c"