CVE-2013-1868

NameCVE-2013-1868
DescriptionMultiple buffer overflows in VideoLAN VLC media player 2.0.4 and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to the (1) freetype renderer and (2) HTML subtitle parser.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2973-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vlc (PTS)jessie, jessie (lts)2.2.7-1~deb8u1fixed
stretch (security)3.0.12-0+deb9u1fixed
stretch (lts), stretch3.0.21-0+deb9u1fixed
buster, buster (lts)3.0.21-0+deb10u1fixed
buster (security)3.0.20-0+deb10u1fixed
bullseye (security), bullseye3.0.21-0+deb11u1fixed
bookworm (security), bookworm3.0.21-0+deb12u1fixed
sid, trixie3.0.21-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vlcsourcesqueeze(unfixed)end-of-life
vlcsourcewheezy2.0.3-5+deb7u1DSA-2973-1
vlcsource(unstable)2.0.5-1

Notes

[squeeze] - vlc <end-of-life> (Unsupported in squeeze-lts)
http://www.videolan.org/security/sa1301.html
The freetype issue is a harmless NULL deref and won't be fixed

Search for package or bug name: Reporting problems