VideoLAN association
A project and a non-profit organization, composed of volunteers, developing and promoting free, open-source multimedia solutions.

Security Advisory 1103

Summary           : Heap corruption in MP4 demultiplexer
Date              : April 2011
Affected versions : VLC media player 1.1.8 down to 1.0.0
ID                : VideoLAN-SA-1103
CVE reference     : CVE-2011-1684


When parsing some MP4 (MPEG-4 Part 14) files, insufficient buffer size might lead to corruption of the heap.


If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player.

Threat mitigation

Exploitation of this issue requires the user to explicitly open an MP4 file with some specific content.


The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Alternatively, the MP4 decoder plugin (libmp4_plugin.*) can be removed manually from the VLC plugin installation directory.


VLC media player 1.1.9 will address this issue. Patches for older versions are available from the official VLC source code repositories.


This vulnerability was reported by Aliz Hammond.


The VideoLAN project
VLC official GIT repository;a=commit;h=5637ca8141bf39f263ecdb62035d2cb45c740821


7 April 2011
Vendor notified
9 April 2011
Patches published
Security advisory published
12 April 2011
VLC media player 1.1.9 released
13 April 2011
CVE ID reserved
Rémi Denis-Courmont,
on behalf of the VideoLAN project