Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 31 Jan 2011 16:30:09 -0500 (EST)
From: Josh Bressers <>
Cc: coley <>
Subject: Re: CVE request: code execution in VLC media player

Please use CVE-2011-0531.



----- Original Message -----
> When opening a malformed MKV (WebM or Matroska) file in VLC, it is
> possible to corrupt memory and execute arbitrary code.
> Proof-of-concept exploit code is available and may be made public
> soon.
> -Dan
> [1]
> [2]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ