Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 31 Jan 2011 16:30:09 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request: code execution in VLC media player

Please use CVE-2011-0531.

Thanks.

-- 
    JB

----- Original Message -----
> When opening a malformed MKV (WebM or Matroska) file in VLC, it is
> possible to corrupt memory and execute arbitrary code.
> Proof-of-concept exploit code is available and may be made public
> soon.
> 
> -Dan
> 
> [1] http://www.videolan.org/security/sa1102.html
> [2]
> http://git.videolan.org/?p=vlc.git;a=commit;h=59491dcedffbf97612d2c572943b56ee4289dd07

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ