Skip to content

VLC executes arbitrary plugins

At startup, VLC recursively scans the modules/ and plugins/ subdirectories from the current working directory, and tries to execute the vlc_entry!__0_8_6 (or another in other VLC versions) symbol from any file matching the "lib*_plugin.so" pattern.

This is a local privilege escalation vulnerability.

Edited by Rémi Denis-Courmont
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information