VideoLAN, a project and a non-profit organization.

Security Bulletin VLC 3.0.18

Summary           : Multiple vulnerabilities fixed in VLC media player
Date              : November 2022
Affected versions : VLC media player 3.0.17 and earlier
ID                : VideoLAN-SB-VLC-3018


A denial of service could be triggered with a wrong mp4 file (div by 0) (#27202)

Fix crashes with multiple files due to double free (#26930)

A denial of service could be triggered with wrong oog file (null pointer dereference) (#27294)

Potential buffer overflow in the vnc module could trigger remote code execution if a malicious vnc URL is deliberately played (#27335, CVE-2022-41325)


If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

We have not seen exploits performing code execution through these vulnerability

Threat mitigation

Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.


The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.


VLC media player 3.0.18 addresses the issue.


The vnc module vulnerability was reported and fixed by 0xMitsurugi from Synacktiv (#27335, CVE-2022-41325)


The VideoLAN project
VLC official GIT repository