A vulnerability has been discovered in VLC media player, allowing for the remote execution of arbitrary code.
|Package||media-video/vlc on all architectures|
|Affected versions||< 0.8.6c|
|Unaffected versions||>= 0.8.6c|
VLC media player is a multimedia player for various audio and video formats.
David Thiel from iSEC Partners Inc. discovered format string errors in various plugins when parsing data. The affected plugins include Vorbis, Theora, CDDA and SAP.
A remote attacker could entice a user to open a specially crafted media file, possibly resulting in the execution of arbitrary code with the privileges of the user running VLC media player.
There is no known workaround at this time.
All VLC media player users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6c"
July 28, 2007
July 28, 2007: 01