Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14313
https://exchange.xforce.ibmcloud.com/vulnerabilities/31226
http://www.vupen.com/english/advisories/2007/0026
http://www.videolan.org/sa0701.html
http://www.videolan.org/patches/vlc-0.8.6-MOAB-02-01-2007.patch
http://www.via.ecp.fr/via/ml/vlc-devel/2007-01/msg00005.html
http://www.securityfocus.com/bid/21852
http://www.novell.com/linux/security/advisories/2007_13_xine.html
http://www.debian.org/security/2007/dsa-1252
http://trac.videolan.org/vlc/changeset/18481
http://securitytracker.com/id?1017464
http://security.gentoo.org/glsa/glsa-200701-24.xml
http://secunia.com/advisories/23971
http://secunia.com/advisories/23910
http://secunia.com/advisories/23829
http://secunia.com/advisories/23592
http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html
http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html