VideoLAN Security Advisory 1501 - VideoLAN
VideoLAN, a project and a non-profit organization.

Security Advisory 1501

Summary           : Multiple buffer and heap overflows in VLC modules and updater
Date              : February 2015
Affected versions : VLC media player 2.1.5 and earlier
ID                : VideoLAN-SA-1501
CVE reference     : CVE-2014-9630, CVE-2014-9629, CVE-2014-9625, CVE-2014-9626, CVE-2014-9627, CVE-2014-9628

Details

This is a collection of crashes, of low to medium impact, that affect several components of VLC.

A heap overflow in the decomp stream filter, for Unix.

A buffer overflow in the schroedinger module, for Dirac streams. (CVE-2014-9629)

Buffer overflows when parsing string boxes in mp4 demuxer. (CVE-2014-9626, 9627, 9628)

A integer overflow in the SRTP module (only shipped on Unix, Windows not affected).

A read overflow in the Ogg demuxer.

A potential buffer overflow in the update module. (CVE-2014-9625)

A possible RTP streaming invalid memory access. (CVE-2014-9630)

Impact

If successful, a malicious third party could trigger either nothing, or an invalid memory access, or lead to a crash of VLC or an arbitratry code execution.

Threat mitigation

Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.

ASLR and DEP help reduce exposure, but may be bypassed.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Solution

VLC media player 2.1.6 addresses all those issues. Patches for older versions are available from the official VLC source code repository 2.1.

VLC media player 2.2.0 addresses all those issues, and more, except (CVE-2014-9629), that is fixed in 2.2.1.

References

The VideoLAN project
http://www.videolan.org/
VLC official GIT repository
http://git.videolan.org/?p=vlc.git