oss-sec mailing list archives
CVE request: code execution in VLC media player
From: Dan Rosenberg <dan.j.rosenberg () gmail com>
Date: Mon, 31 Jan 2011 10:18:20 -0500
When opening a malformed MKV (WebM or Matroska) file in VLC, it is possible to corrupt memory and execute arbitrary code. Proof-of-concept exploit code is available and may be made public soon. -Dan [1] http://www.videolan.org/security/sa1102.html [2] http://git.videolan.org/?p=vlc.git;a=commit;h=59491dcedffbf97612d2c572943b56ee4289dd07
Current thread:
- CVE request: code execution in VLC media player Dan Rosenberg (Jan 31)
- Re: CVE request: code execution in VLC media player Josh Bressers (Jan 31)