VideoLAN association
A project and a non-profit organization, composed of volunteers, developing and promoting free, open-source multimedia solutions.

Security Advisory 1101

Summary           : Heap corruption in CDG decoder
Date              : January 2011
Affected versions : VLC media player 1.1.5 and earlier
ID                : VideoLAN-SA-1101
CVE reference     : CVE-2011-0021


When parsing an invalid CDG file, insufficient boundary checks might lead to corruption of the heap.


If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player.

Threat mitigation

Exploitation of this issue requires the user to explicitly open a specially crafted file.


The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Alternatively, the CDG decoder plugin (libcdg_plugin.*) can be removed manually from the VLC plugin installation directory.


VLC media player 1.1.6 addresses this issue. Patches for older versions are available from the official VLC source code repositories.


This vulnerability was reported by Dan Rosenberg from VSR.


The VideoLAN project
VLC official GIT repository;a=commit;h=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab
Dan Rosenberg, VSR


7 January 2011
Vendor notified
11 January 2011
Patches published
20 January 2011
CVE ID reserved
23 January 2011
VLC media player 1.1.6 released
25 January 2011
Security advisory published
Rémi Denis-Courmont,
on behalf of the VideoLAN project