blob: 06a6468f46857ce99034f1b9cb33577c5818cc83 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200707-12">
<title>VLC media player: Format string vulnerabilities</title>
A vulnerability has been discovered in VLC media player, allowing for the
remote execution of arbitrary code.
<product type="ebuild">vlc</product>
<announced>July 28, 2007</announced>
<revised>July 28, 2007: 01</revised>
<package name="media-video/vlc" auto="yes" arch="*">
<unaffected range="ge">0.8.6c</unaffected>
<vulnerable range="lt">0.8.6c</vulnerable>
VLC media player is a multimedia player for various audio and video
David Thiel from iSEC Partners Inc. discovered format string errors in
various plugins when parsing data. The affected plugins include Vorbis,
Theora, CDDA and SAP.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted media
file, possibly resulting in the execution of arbitrary code with the
privileges of the user running VLC media player.
There is no known workaround at this time.
All VLC media player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6c&quot;</code>
<uri link="">CVE-2007-3316</uri>
<metadata tag="requester" timestamp="Sat, 14 Jul 2007 21:42:20 +0000">
<metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:31:02 +0000">
<metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:31:47 +0000">