If successful, it is unknown whether a malicious third party might be able to trigger execution of arbitrary code. Successful exploitation of this bug can crash the process of the media player.
Credit:
The information has been provided by Dan Rosenberg.
Vulnerable Systems:
* VLC media player 1.1.5 and earlier
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
Alternatively, the CDG decoder plugin (libcdg_plugin.*) can be removed manually from the VLC plugin installation directory.
Vendor Status:
VideoLAN had issues an update for this vulnerability