VideoLAN, a project and a non-profit organization.

Security Advisory 1105

Summary           : Heap overflow in RealMedia demuxer
Date              : 12 July 2011
Affected versions : VLC media player 1.1.10 down to 1.1.0
ID                : VideoLAN-SA-1105
CVE references    : CVE-2011-2587


VLC media player suffers from a heap overflow vulnerability in the Real Media file parser.


If successful, a malicious third party could crash the player instance. Arbitrary code execution within the context of VLC media player might be possible, though it was unconfirmed.

Threat mitigation

Exploitation of those bugs requires the user to explicitly open specifically crafted malicious files.


The user may refrain from opening files from untrusted sources.

Alternatively, the RealMedia plugin (demux/libreal_plugin.*) can be removed. This will however prevent use of any of Real Media files.


VLC media player 1.1.11 addresses this issue and introduces further stability fixes. A source code patch is also available as an alternative.


This vulnerability was discovered by Hossein Lotfi and reported via Secunia.


The VideoLAN Project
Source code patch
git commit 1bce40644cddee93b4b1877a94a6ce345f32852c


15 July 2011
VLC 1.1.11 released
12 July 2011
Initial advisory
10 July 2011
Issue resolved privately
08 July 2011
CVE identifier assigned
07 June 2011
Bug reported
Rémi Denis-Courmont,
on behalf of the VideoLAN project