VideoLAN association
A project and a non-profit organization, composed of volunteers, developing and promoting free, open-source multimedia solutions.

Security Advisory 0806

Summary           : Heap-overflow in the VLC WAV demuxer
Date              : July 2008
Affected versions : VLC media player 0.8.6h and earlier
ID                : VideoLAN-SA-0806, Secunia SA30601
CVE reference     : CVE-2008-2430


When parsing the header of an invalid RIFF WAVE (.WAV) sound file, an integer overflow might happen causing an heap-based buffer overflow.


If successful, a malicious third party could trigger execution of arbitrary code within the context of the VLC media player, or otherwise crash the player instance.

Threat mitigation

Exploitation of this issue requires the user to explicitly open a specially crafted file.


The user should refrain from opening files from untrusted third parties or accessing untrusted Web sites (or disable the VLC browser plugins), until the patch is applied.


VLC media player 0.8.6i addresses this issue, and adds further sanity checks to the RIFF WAVE demuxers.


This vulnerability was discovered by Alin Rad Pop, Secunia Research.


Secunia Research
The VideoLAN project


12 July 2008
VLC 0.8.6i bugfix release
28 June 2008
Source code fixes for VLC 0.8.6h and development tree
27 June 2008
Vendor notified
Rémi Denis-Courmont,
on behalf of the VideoLAN project