VideoLAN, a project and a non-profit organization.

Security Bulletin VLC 3.0.21

Summary           : Vulnerability fixed in VLC media player
Date              : June 2024
Affected versions : VLC media player 3.0.20 and earlier
ID                : VideoLAN-SB-VLC-3021


A denial of service through a potential integer overflow could be triggered with a maliciously crafted mms stream (heap based overflow)


If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

We have not seen exploits performing code execution through this vulnerability.

Threat mitigation

Exploitation of those issues requires the user to explicitly open a maliciously crafted mms stream.


The user should refrain from opening mms streams from untrusted third parties (or disable the VLC browser plugins), until the patch is applied.


VLC media player 3.0.21 addresses the issue.


Reported by Andreas Fobian of Mantodea Security GmbH


The VideoLAN project
VLC official GIT repository