|
Message-ID: <20100422203033.54cd90f7@mail.a3li.li>
Date: Thu, 22 Apr 2010 20:30:33 +0200
From: Alex Legler <a3li@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: VLC <1.0.6 Multiple issues
Hi,
in case there was no request from upstream yet:
VLC media player suffers from various vulnerabilities when attempting
to parse malformatted or overly long byte streams.
* Heap buffer overflow vulnerability in A/52, DTS and MPEG Audio
decoders
* Invalid memory access in AVI, ASF, Matroska (MKV)
demuxers
* Invalid memory access in XSPF playlist parser
* Inavlid memory access in ZIP archive decompressor
* Heap buffer overflow in RTMP access
http://www.videolan.org/security/sa1003.html
Thanks,
Alex
--
Alex Legler | Gentoo Security / Ruby
a3li@...too.org | a3li@...ber.ccc.de
Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.