VideoLAN NULL Dereference Vulnerability in HTTP and RSTP Server
22 Oct. 2011
Summary
If successful, a malicious third party could crash the server process. Arbitrary code execution within the context of VLC media player is not believed possible.
Credit:
The information has been provided by Jouni Knuutinen, Antti Kiuru.
Vulnerable Systems:
* VLC media player 1.1.11 and ealier
Where possible, limit access to the VLC server to trusted IP addresses. Alternatively, configure a deep inspection firewall to block malformed HTTP and RTSP requests.
Vendor Status:
VideoLAN had issued an update for this vulnerability