CERT-In Vulnerability Note
CIVN-2011-0194
VLC Media Player "get_chunk_header" Double-Free Vulnerability
Original Issue Date:December 27, 2011
Severity Rating: HIGH
Systems Affected
- VLC media player versions 0.9.0 through 1.1.12
Overview
A vulnerability has been reported in VLC Media Player before , which could be exploited by remote attackers to execute arbitrary code and crash an affected application or compromise a vulnerable system.
Description
This vulnerability exist in Video LAN VLC Media Player due to a double-free error within the "get_chunk_header()" function (modules/demux/ty.c) of the TiVo demuxer . A remote attacker could exploit this vulnerability by convincing a user to open a specially crafted TiVo (*.ty) file . Resulting in execution of arbitrary code and crash an affected application or compromise a vulnerable system.
Workaround
- The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
- The TY demux plugin (libty_plugin.*) can be removed manually from the VLC plugin installation directory. This will prevent opening of TiVo files
Solution
Upgrade to VLC Media Player version 1.1.13 :
http://www.videolan.org/vlc/
Vendor Information
Videolan
www.videolan.org/security/sa1108.html
References
Secunia
http://secunia.com/advisories/47325/
Security Tracker
http://securitytracker.com/id/1026449
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|