From ${URL} : Description Kaveh Ghaemmaghami has discovered a vulnerability in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an integer overflow error within the libmkv_plugin.dll module when parsing MKV files, which can be exploited to cause a heap-based buffer overflow via an MKV file with a specially crafted header. Successful exploitation may allow execution of arbitrary code. The vulnerability is confirmed in version 2.0.7. Other versions may also be affected. Solution: No official solution is currently available. Provided and/or discovered by: Kaveh Ghaemmaghami via Secunia. Original Advisory: Secunia: http://secunia.com/blog/372/ @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
CVE-2013-3245 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3245): ** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating "This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine." A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow.
Fixed in version 2.08 http://www.videolan.org/vlc/releases/2.0.8.html
Added to an existing GLSA request.
This issue was resolved and addressed in GLSA 201411-01 at http://security.gentoo.org/glsa/glsa-201411-01.xml by GLSA coordinator Sean Amoss (ackle).