PDA

View Full Version : "VLC Player Vulnerable to Remote Hijack"



Jdsnut
03-19-2008, 04:01 AM
VLC is a fully used player because of it massive amounts of codecs, and the new version has a major security flaw.
The problem can be exploited to a point where it compromises a person system,
as it leaves it wide open for a malicious user to run arbitrary code.
Version 0.8.6d was supposedly fix but for some reason it passed testing even though the patch didn't work.
I'm kinda glad I removed it when I did.


:fst:
http://208.101.40.56/vb3/picture.php?albumid=25&pictureid=2156

:view: Homepage: http://torrentfreak.com/vlc-player-vulnerable-remote-hijack-080318/

Skiz
03-19-2008, 04:59 AM
I still won't remove it.

If some loser wants to run an "arbitrary code" on my computer, they're probably smart enough to do it without the help of some VLC flaw.

It also states that the vulnerability is only when running a subtitle file which I never do and can't see doing in the near future. :idunno:

akenat0n
03-19-2008, 05:21 AM
The 0.8.6e is out and I think it's somewhat fixed, however, Secunia says "Do not process untrusted subtitles using VLC."

Who opens unknowns files? :P

Enlightened
03-19-2008, 05:29 AM
VLC Player Vulnerable to Remote Hijack (http://www.rlslog.net/vlc-player-vulnerable-to-remote-hijack/)

Posted on 19.03.2008 at 02:13 in Tech News (http://www.rlslog.net/category/tech-news/) by Kennii (http://www.rlslog.net/author/kenni/)
http://i28.tinypic.com/2m4d1yv.jpgVLC Player, one of the best and most widely used media players has found to be vulnerable to a remote hijack. The reported vulnerability makes it possible for a malicious user to run arbitrary code, potentially taking remote control of the host machine.
VLC (http://www.videolan.org/vlc/) is a popular media player among BitTorrent users. Not just for the fact that it is free, also because it includes a huge number of the video codecs, so it can play virtually every video file available. Unfortunately, the latest versions of VLC have a security flaw according to a report (http://secunia.com/advisories/28233/) from Luigi Auriemma. The vulnerability can be exploited to compromise a user’s system, as it leaves it wide open for a malicious user to run arbitrary code.
The problem occurs when a someone loads a subtitle file, which causes a buffer overflow that can be exploited. The security flaw is platform independent, which means it affects Windows, Mac and Linux users.
Initially it was reported that the flaws in version 0.8.6d were fixed in the latest release, but this turns out not to be the case. Auriemma writes (http://securityvulns.com/Tdocument429.html): “The old buffer-overflow in the subtitles handled by VLC has not been fully patched in version 0.8.6e.”
“The funny thing is that my old proof-of-concept was built just to test this specific buffer-overflow and in fact it works on the new VLC version too without modifications,” he adds.
For now, the only solutions are not to run any subtitle files, or to grab one of the nightly builds (http://nightlies.videolan.org/). The downside is, however, that these might not be as stable as the regular releases.

mindtrick
03-19-2008, 06:07 AM
http://filesharingtalk.com/vb3/f-news-section-95/t--vlc-player-vulnerable-remote-hijack-285239

amade
03-19-2008, 06:46 AM
So, does that mean we'll be safe as long as we don't play any title with subtitle / captions...?

Enlightened
03-19-2008, 07:17 AM
So, does that mean we'll be safe as long as we don't play any title with subtitle / captions...?
Yes....

Swift
03-19-2008, 07:19 AM
A simple answer i don`t use VLC.. BSplayer runz the show around movies

amade
03-19-2008, 07:22 AM
So, does that mean we'll be safe as long as we don't play any title with subtitle / captions...?
Yes....

Thx for the quick response. Now I'm relieved :)

Disme
03-19-2008, 09:21 AM
Hmmm ... little confused here. If you are behind a router with firewall and you have a decent AV and you have a software firewall and some other crap that keeps track of things that happen on your box. How can someone come into your PC and execute some kind of code???

Doesn't this implies someone has ta have the possibility to get into your PC first to execute the code???

amade
03-19-2008, 10:23 AM
Hmmm ... little confused here. If you are behind a router with firewall and you have a decent AV and you have a software firewall and some other crap that keeps track of things that happen on your box. How can someone come into your PC and execute some kind of code???

Doesn't this implies someone has ta have the possibility to get into your PC first to execute the code???

Maybe the above VLC vulnerability is effective only for PCs without firewall, etc? With firewall working, the attack can be filtered out, I believe.

akenat0n
03-19-2008, 06:05 PM
Actually I think they have to give you the file (the subtitle) and you have to run it before they can have control. However it wouldn't work out if you block incoming or outgoing VLC connections.

And 0.8.6e fixed the other bug, so don't worry.

Jdsnut
03-19-2008, 09:23 PM
VLC Player Vulnerable to Remote Hijack (http://www.rlslog.net/vlc-player-vulnerable-to-remote-hijack/)

Posted on 19.03.2008 at 02:13 in Tech News (http://www.rlslog.net/category/tech-news/) by Kennii (http://www.rlslog.net/author/kenni/)
http://i28.tinypic.com/2m4d1yv.jpgVLC Player, one of the best and most widely used media players has found to be vulnerable to a remote hijack. The reported vulnerability makes it possible for a malicious user to run arbitrary code, potentially taking remote control of the host machine.
VLC (http://www.videolan.org/vlc/) is a popular media player among BitTorrent users. Not just for the fact that it is free, also because it includes a huge number of the video codecs, so it can play virtually every video file available. Unfortunately, the latest versions of VLC have a security flaw according to a report (http://secunia.com/advisories/28233/) from Luigi Auriemma. The vulnerability can be exploited to compromise a user’s system, as it leaves it wide open for a malicious user to run arbitrary code.
The problem occurs when a someone loads a subtitle file, which causes a buffer overflow that can be exploited. The security flaw is platform independent, which means it affects Windows, Mac and Linux users.
Initially it was reported that the flaws in version 0.8.6d were fixed in the latest release, but this turns out not to be the case. Auriemma writes (http://securityvulns.com/Tdocument429.html): “The old buffer-overflow in the subtitles handled by VLC has not been fully patched in version 0.8.6e.”
“The funny thing is that my old proof-of-concept was built just to test this specific buffer-overflow and in fact it works on the new VLC version too without modifications,” he adds.
For now, the only solutions are not to run any subtitle files, or to grab one of the nightly builds (http://nightlies.videolan.org/). The downside is, however, that these might not be as stable as the regular releases.

:frusty: Thats what I just posted.?

DasFox
03-28-2008, 11:48 AM
0.8.6e user here! ;)

esco123
03-28-2008, 12:53 PM
vlc is a great software, and i neva will remove it.