First published: Mon Feb 07 2011(Updated: )
The StripTags function in (1) the USF decoder (modules/codec/subtitles/subsdec.c) and (2) the Text decoder (modules/codec/subtitles/subsusf.c) in VideoLAN VLC Media Player 1.1 before 1.1.6-rc allows remote attackers to execute arbitrary code via a subtitle with an opening "<" without a closing ">" in an MKV file, which triggers heap memory corruption, as demonstrated using refined-australia-blu720p-sample.mkv.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
VideoLAN VLC media player | =1.1.3 | |
VideoLAN VLC media player | =1.1.4 | |
VideoLAN VLC media player | =1.1.5 | |
VideoLAN VLC media player | =1.1.2 | |
VideoLAN VLC media player | =1.1.0 | |
VideoLAN VLC media player | =1.1.6 | |
VideoLAN VLC media player | =1.1.1 | |
VLC media player | =1.1.0 | |
VLC media player | =1.1.1 | |
VLC media player | =1.1.2 | |
VLC media player | =1.1.3 | |
VLC media player | =1.1.4 | |
VLC media player | =1.1.5 | |
VLC media player | =1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0522 has been rated as critical due to its potential to allow remote code execution.
To fix CVE-2011-0522, upgrade VLC Media Player to version 1.1.6 or later.
VLC Media Player versions 1.1.0 through 1.1.5 are affected by CVE-2011-0522.
Yes, CVE-2011-0522 can be exploited by using specially crafted subtitles with unclosed tags.
Exploitation of CVE-2011-0522 can allow attackers to execute arbitrary code on a victim's machine.