From $URL : Description A vulnerability has been reported in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in the "DemuxPacket()" function (modules/demux/asf/asf.c) when processing ASF files and can be exploited to cause a buffer overflow via a specially crafted ASF file. Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious file. The vulnerability is reported in versions 2.05 and prior. Solution The vulnerability will be fixed in upcoming version 2.0.6. No official solution is currently available. Provided and/or discovered by The vendor credits Debasish Mandal. Original Advisory VideoLAN-SA-1302: http://www.videolan.org/security/sa1302.html
This is fixed in 2.0.6, is ready to go to stable?
CVE-2013-1954 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1954): The ASF Demuxer (modules/demux/asf/asf.c) in VideoLAN VLC media player 2.0.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ASF movie that triggers an out-of-bounds read.
2.0.7 has been stabled in the meantime. GLSA request filed.
This issue was resolved and addressed in GLSA 201411-01 at http://security.gentoo.org/glsa/glsa-201411-01.xml by GLSA coordinator Sean Amoss (ackle).