Cyber Attack | Data Breach

Published on July 24th, 2019 📆 | 7432 Views ⚑

0

Dodgy vids can hijack PCs via VLC security flaw, US, Germany warn. Software’s makers not app-y with that claim –


iSpeech.org

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

VLC is said to be once again vulnerable to remote-code execution – meaning a malicious video opened by the software could potentially crash the media player, or joyride it to run malware on the host machine.

However, the developers of the open-source application, which has been downloaded literally billions of times and used by countless netizens, have disputed this claim, and say it is not possible to exploit the programming blunder.

The US government’s NIST this month documented a “critical” heap-based buffer overflow, designated CVE-2019-13615, which is said to be present and unpatched in the most recent official version of VLC, 3.0.7.1. It is, it is claimed, possible to trick a victim into opening a booby-trapped video using VLC that triggers a coding cockup leading to either a harmless crash or rather nasty code execution. The flaw is, we’re told, present in the Linux, Unix, and Windows builds of the player.

According to NIST:

VideoLAN VLC media player 3.0.7.1 has a heap-based buffer over-read in mkv::demux_sys_t::FreeUnused() in modules/demux/mkv/demux.cpp when called from mkv::Open in modules/demux/mkv/mkv.cpp.

While Germany’s CERT and NIST have both logged the flaw in their databases as dangerous and exploitable, the developers of VLC are pumping the brakes on panic over the vulnerability.

In a bug-tracking ticket discussing CVE-2019-13615, VideoLAN lead developer Jean-Baptiste Kempf noted that he was unable to recreate the crash using a proof-of-concept .MP4 video, provided by a security researcher four weeks ago, that’s supposed to knacker the latest version of VLC, 3.0.7.1. Nor was he able to crash the older 3.0.6 and work-in-progress releases, such as 3.0.8, he reported.





“This does not crash a normal release of VLC 3.0.7.1,” added Kempf. “Sorry, but this bug is not reproducible and does not crash VLC at all.”

VLC developer Francois Cartegnie was more blunt earlier today: “If you land on this ticket through a news article claiming a critical flaw in VLC, I suggest you to read the above comment first and reconsider your (fake) news sources.”

Crucially, however, when The Register tried playing the proof-of-concept .MP4 in VLC version 3.0.7 Vetinari (3.0.7-0-g86cee31099) on Linux, the player crashed with a segmentation fault. So there is confusion over what Kempf meant by “does not crash” – because it surely does crash – and whether by “the bug is not reproducible,” he meant remote-code execution is impossible or possible.

It appears the crashy .MP4 was generated as a result of an automated bug-hunting fuzzer running against VLC. El Reg has asked VLC developers at VideoLan for additional comment on the matter, and will update the story when we hear back.

No patch is available yet, though one is said to be coming.

Whether the flaw can be confirmed or not, the clash should serve as a reminder to users and admins that media plugins and players such as VLC can and do contain security vulnerabilities, and should regularly be updated to thwart attempts by hackers to exploit bugs within the code.

Earlier this year, veteran Apple security researcher Patrick Wardle explained how VLC and other legacy applications could be used by attackers as entry points for attackers looking to get around newer macOS security protections. In that scenario the software itself is not vulnerable, but rather has privileges associated with it that could allow a malicious plugin to get at sensitive system components. The media player’s maker also just recently patched a bunch of flaws in VLC by releasing version 3.0.7.1.

www.extremehacking.org

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv10,CHFI,ECSAv10,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v10 course in Pune-India, ceh certification in pune-India, ceh v10 training in Pune-India, Ethical Hacking Course in Pune-India

Source link

Tagged with:



Comments are closed.