lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 20 Aug 2015 15:01:39 +0200
From: Andrea Barisani <>
Subject: [oCERT-2015-009] VLC arbitrary pointer dereference

#2015-009 VLC arbitrary pointer dereference


The VLC media player is an open source media player and streaming media

The stable VLC version suffers from an arbitrary pointer dereference

The vulnerability affects the 3GP file format parser, insufficient
restrictions on a writable buffer can be exploited to execute arbitrary code
via the heap memory. A specific 3GP file can be crafted to trigger the

Affected version:
  VLC <= 2.2.1

Fixed version:
  VLC, N/A (see References for patch committed to 2.2.2 branch)

Credit: vulnerability reported by Loren Maggiore of Trail of Bits.

CVE: CVE-2015-5949


2015-07-28: vulnerability report received
2015-07-29: contacted VLC security maintainer
2015-08-03: maintainer commits fix to stable branch
2015-08-06: assigned CVE
2015-08-17: contacted affected vendors
2015-08-20: advisory release



Andrea Barisani |                Founder & Project Coordinator
          oCERT | OSS Computer Security Incident Response Team

 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
        "Pluralitas non est ponenda sine necessitate"

Powered by blists - more mailing lists