VideoLAN, a project and a non-profit organization.

Security Advisory 1101

Summary           : Heap corruption in CDG decoder
Date              : January 2011
Affected versions : VLC media player 1.1.5 and earlier
ID                : VideoLAN-SA-1101
CVE reference     : CVE-2011-0021

Details

When parsing an invalid CDG file, insufficient boundary checks might lead to corruption of the heap.

Impact

If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player.

Threat mitigation

Exploitation of this issue requires the user to explicitly open a specially crafted file.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Alternatively, the CDG decoder plugin (libcdg_plugin.*) can be removed manually from the VLC plugin installation directory.

Solution

VLC media player 1.1.6 addresses this issue. Patches for older versions are available from the official VLC source code repositories.

Credits

This vulnerability was reported by Dan Rosenberg from VSR.

References

The VideoLAN project
http://www.videolan.org/
VLC official GIT repository
http://git.videolan.org/?p=vlc.git;a=commit;h=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab
Dan Rosenberg, VSR
http://www.vsecurity.com/

History

7 January 2011
Vendor notified
11 January 2011
Patches published
20 January 2011
CVE ID reserved
23 January 2011
VLC media player 1.1.6 released
25 January 2011
Security advisory published
Rémi Denis-Courmont,
on behalf of the VideoLAN project