From 08d66d63bcd52a20d59e23bc9d42d36f47ff7b0c Mon Sep 17 00:00:00 2001
From: Martin Wilke <miwi@FreeBSD.org>
Date: Fri, 29 Jun 2007 09:42:05 +0000
Subject: - Document vlc - format string vulnerability and integer overflow

---
 security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1d8b3d81aae0..e76a5557256c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,36 @@ Note:  Please add new entries to the beginning of this file.
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="7128fb45-2633-11dc-94da-0016179b2dd5">
+    <topic>vlc -- format string vulnerability and integer overflow</topic>
+    <affects>
+      <package>
+	<name>vcl</name>
+	<range><lt>0.8.6c</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>isecpartners reports:</p>
+	<blockquote cite="http://www.isecpartners.com/advisories/2007-001-vlc.txt">
+	  <p>VLC is vulnerable to a format string attack in the parsing
+	    of Vorbis comments in Ogg Vorbis and Ogg Theora files, CDDA
+	    data or SAP/SDP service discovery messages. Additionally,
+	    there are two errors in the handling of wav files, one a
+	    denial of service due to an uninitialized variable, and one
+	    integer overflow in sampling frequency calculations.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.isecpartners.com/advisories/2007-001-vlc.txt</url>
+    </references>
+    <dates>
+      <discovery>2007-06-05</discovery>
+      <entry>2007-06-18</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="32d38cbb-2632-11dc-94da-0016179b2dd5">
     <topic>flac123 -- stack overflow in comment parsing </topic>
     <affects>
-- 
cgit debian/1.2.3+git2.25.1-1-2-gaceb0