From $URL: Details When parsing some MP4 (MPEG-4 Part 14) files, insufficient buffer size might lead to corruption of the heap. Impact If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player. Threat mitigation Exploitation of this issue requires the user to explicitly open an MP4 file with some specific content.
vlc 1.1.9 is in the tree and should fix this
(In reply to comment #1) > vlc 1.1.9 is in the tree and should fix this Great, thank you. Arches, please test and mark stable: =media-video/vlc-1.1.9 Target keywords : "alpha amd64 ppc ppc64 sparc x86"
amd64 ok
x86 stable
amd64 stable
alpha/sparc stable
ppc done
ppc64 stable, last arch done
Thanks, everyone. Added to existing GLSA request.
CVE-2011-1684 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1684): Heap-based buffer overflow in the MP4_ReadBox_skcr function in libmp4.c in the MP4 demultiplexer in VideoLAN VLC media player before 1.1.9 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted MP4 file.
This issue was resolved and addressed in GLSA 201411-01 at http://security.gentoo.org/glsa/glsa-201411-01.xml by GLSA coordinator Sean Amoss (ackle).