VideoLAN association
A project and a non-profit organization, composed of volunteers, developing and promoting free, open-source multimedia solutions.

Security Advisory 1106

Summary           : Heap overflow in AVI demuxer
Date              : 12 July 2011
Affected versions : VLC media player 1.1.10 down to 0.5.0
ID                : VideoLAN-SA-1106
CVE references    : CVE-2011-2588


VLC media player suffers from a heap overflow vulnerability in the AVI file parser.


If successful, a malicious third party could crash the player instance. Arbitrary code execution within the context of VLC media player might be possible, though it was unconfirmed.

Threat mitigation

Exploitation of those bugs requires the user to explicitly open specifically crafted malicious files.


The user may refrain from opening files from untrusted sources.

Alternatively, the AVI plugin (demux/libavi_plugin.*) can be removed. This will however prevent use of any of AVI media files.


VLC media player 1.1.11 addresses this issue and introduces further stability fixes. A source code patch is also available as an alternative.


This vulnerability was discovered by Hossein Lotfi and reported via Secunia.


The VideoLAN Project
Source code patch
git commit 9c14964bd11482d5c1d6c0e223440f9f1e5b1831


15 July 2011
VLC 1.1.11 released
12 July 2011
Initial advisory
10 July 2011
Issue resolved privately
08 July 2011
CVE identifier assigned
07 June 2011
Bug reported
Rémi Denis-Courmont,
on behalf of the VideoLAN project