Nico Golde <[email protected]> wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>- -------------------------------------------------------------------------
>Debian Security Advisory DSA-2257-1                   [email protected]
>http://www.debian.org/security/                                Nico Golde
>June 10, 2011                          http://www.debian.org/security/faq
>- -------------------------------------------------------------------------
>
>Package        : vlc
>Vulnerability  : heap-based buffer overflow
>Problem type   : local
>Debian-specific: no
>CVE ID         : CVE-2011-2194
>
>Rocco Calvi discovered that the XSPF playlist parser of vlc, a multimedia
>player and streamer, is prone to an integer overflow resulting in a
>heap-based buffer overflow.  This might allow an attacker to execute
>arbitrary code by tricking a victim into opening a specially crafted
>file.
>
>
>The oldstable distribution (lenny) is not affected by this problem.
>
>For the stable distribution (squeeze), this problem has been fixed in
>version 1.1.3-1squeeze6.
>
>For the testing (wheezy) and unstable (sid) distributions, this
>problem will be fixed soon.
>
>
>We recommend that you upgrade your vlc packages.
>
>Further information about Debian Security Advisories, how to apply
>these updates to your system and frequently asked questions can be
>found at: http://www.debian.org/security/
>
>Mailing list: [email protected]
>
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.11 (GNU/Linux)
>
>iEYEARECAAYFAk3x8LQACgkQHYflSXNkfP8cVQCfXsLglWJUAsX/RfFYMesf4jOv
>7qYAnilMfj3iqc7MsgjS1oFkzkPLgRAc
>=rAAI
>-----END PGP SIGNATURE-----
>
>
>-- 
>To UNSUBSCRIBE, email to [email protected]
>with a subject of "unsubscribe". Trouble? Contact [email protected]
>Archive: http://lists.debian.org/[email protected]
>

Reply via email to