Vulnerability Note VU#200928
VLC Media Player format string vulnerability
VLC contains a format string vulnerability that may allow an attacker to execute code.
VideoLAN (VLC) is a streaming media player that runs on multiple platforms.
From VideoLAN Security Advisory 0702:
VLC media player Ogg/Vorbis, Ogg/Theora, CDDA (CD Digital Audio) and SAP (Service Announce Protocol) plugins are prone to a C-style format string vulnerability when trying to parse a media data stream.
Valid but carefully crafted .ogg (Vorbis) or .ogm (Theora) files, CDDB entries or SAP/SDP messages can trigger the bug. We therefore consider this bug to have a high severity.
A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running VLC.
Disable the affected components
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|VideoLAN||Affected||-||23 Jul 2007|
CVSS Metrics (Learn More)
Thanks to the VLC team for information that was used in this report.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2007-3316
- Date Public: 20 Jun 2007
- Date First Published: 23 Jul 2007
- Date Last Updated: 24 Jul 2007
- Severity Metric: 8.82
- Document Revision: 13
If you have feedback, comments, or additional information about this vulnerability, please send us email.