CVE-2011-0531
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
07/02/2011
Last modified:
11/04/2025
Description
demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:* | 1.1.6.1 (including) | |
cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:* | ||
cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3D59491dcedffbf97612d2c572943b56ee4289dd07
- http://osvdb.org/70698
- http://secunia.com/advisories/43131
- http://secunia.com/advisories/43242
- http://www.debian.org/security/2011/dsa-2159
- http://www.openwall.com/lists/oss-security/2011/01/31/4
- http://www.openwall.com/lists/oss-security/2011/01/31/8
- http://www.securityfocus.com/bid/46060
- http://www.securitytracker.com/id?1025018=
- http://www.videolan.org/security/sa1102.html
- http://www.vupen.com/english/advisories/2011/0363
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65045
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12415
- http://git.videolan.org/?p=vlc.git%3Ba%3Dcommit%3Bh%3D59491dcedffbf97612d2c572943b56ee4289dd07
- http://osvdb.org/70698
- http://secunia.com/advisories/43131
- http://secunia.com/advisories/43242
- http://www.debian.org/security/2011/dsa-2159
- http://www.openwall.com/lists/oss-security/2011/01/31/4
- http://www.openwall.com/lists/oss-security/2011/01/31/8
- http://www.securityfocus.com/bid/46060
- http://www.securitytracker.com/id?1025018=
- http://www.videolan.org/security/sa1102.html
- http://www.vupen.com/english/advisories/2011/0363
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65045
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12415