VideoLAN association
A project and a non-profit organization, composed of volunteers, developing and promoting free, open-source multimedia solutions.
Facebook
Twitter

Security Advisory 0806

Summary           : Heap-overflow in the VLC WAV demuxer
Date              : July 2008
Affected versions : VLC media player 0.8.6h and earlier
ID                : VideoLAN-SA-0806, Secunia SA30601
CVE reference     : CVE-2008-2430

Details

When parsing the header of an invalid RIFF WAVE (.WAV) sound file, an integer overflow might happen causing an heap-based buffer overflow.

Impact

If successful, a malicious third party could trigger execution of arbitrary code within the context of the VLC media player, or otherwise crash the player instance.

Threat mitigation

Exploitation of this issue requires the user to explicitly open a specially crafted file.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted Web sites (or disable the VLC browser plugins), until the patch is applied.

Solution

VLC media player 0.8.6i addresses this issue, and adds further sanity checks to the RIFF WAVE demuxers.

Credits

This vulnerability was discovered by Alin Rad Pop, Secunia Research.

References

Secunia Research
http://secunia.com/
The VideoLAN project
http://www.videolan.org/

History

12 July 2008
VLC 0.8.6i bugfix release
28 June 2008
Source code fixes for VLC 0.8.6h and development tree
27 June 2008
Vendor notified
Rémi Denis-Courmont,
on behalf of the VideoLAN project