BugTraq
[ GLSA 200707-12 ] VLC media player: Format string vulnerabilities Jul 28 2007 08:04PM
Raphael Marichez (falco gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200707-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: VLC media player: Format string vulnerabilities
Date: July 28, 2007
Bugs: #182389
ID: 200707-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability has been discovered in VLC media player, allowing for
the remote execution of arbitrary code.

Background
==========

VLC media player is a multimedia player for various audio and video
formats.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-video/vlc < 0.8.6c >= 0.8.6c

Description
===========

David Thiel from iSEC Partners Inc. discovered format string errors in
various plugins when parsing data. The affected plugins include Vorbis,
Theora, CDDA and SAP.

Impact
======

A remote attacker could entice a user to open a specially crafted media
file, possibly resulting in the execution of arbitrary code with the
privileges of the user running VLC media player.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All VLC media player users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6c"

References
==========

[ 1 ] CVE-2007-3316
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200707-12.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security (at) gentoo (dot) org [email concealed] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iQEVAwUBRquhXTvRww8BFPxFAQJjrAgAnFx2r+NhJtFQJdFxX0tTW/WPBTGc8jk5
AsbuuvEph4XmTERxoMjN9BKkaeP/qnRmpyF0pDfrJEsYhNUmqLODZtqmpMBsBRYB
1wNmnuOsKqRZMaAWDVNFpHFeNM905Rw7znyV6ou2KPjRelQjpUwNUzDLfyc2j1eU
LpfZEqjNbFgLE1RftYrnBjYHFABvYxnvazF1bBnRgJku8wYDE95JVYK0U5MM76bi
7Rq7cwz7INsRLtBO2tIosTG30m6p3wwUfxd15Pn9iZDrS1Hp/7MXocY2U1CR8Feh
gjV86vSsR4JhGIQEDrnmAXEl/mve+7QGDYggsENod/JpBGiTSCkq5Q==
=pxDf
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus