VLC Media Player 3.0.12 fixes multiple remote code execution flaws

VideoLan released VLC Media Player 3.0.12 for Windows, Mac, and Linux last week with numerous improvements, features, and security fixes.

This release is a significant upgrade for Mac users as it provides native support for Apple Silicon and fixes audio distortion in macOS.

In addition to bug fixes and improvements, this release also fixes numerous security vulnerabilities reported by Zhen Zhou of the NSFOCUS Security Team.

These buffer overflow or invalid dereference vulnerabilities “could trigger either a crash of VLC or an arbitrary code execution with the privileges of the target user.”

According to VideoLan’s security bulletin, a remote user can exploit this vulnerability by creating specially crafted media files and tricking a user into opening them with VLC.

While VideoLan states that this vulnerability will likely crash VLC Media Player, they warn that attackers could use it to leak information or remotely execute commands on the device.

If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user. While these issues in themselves are most likely to just crash the player, we can’t exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

VideoLan states that they have not seen exploits abusing these vulnerabilities in the wild.

Due to the severity of this vulnerability and to benefit from VLC 3.0.12’s improvements, it is strongly advised that all users download and install version 3.0.12.

Source

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s