Malicious code loopholes in VLC player plugged

Source: Heise.de added 21st Jan 2021

  • malicious-code-loopholes-in-vlc-player-plugged

In the current version of the VLC Player, the developers have closed several security holes.

(Image: Tatiana Popova / Shutterstock.com)

The media player VLC Player has been released in a secured version. Users should update the application quickly. If attacks are successful, in the worst case scenario attackers could execute malicious code.

In a security warning, the developers write of several vulnerabilities, but do not mention CVE numbers and risk classifications. If a victim opens media files prepared by an attacker, this can lead to storage errors. The application then crashes. But it could also happen that attackers execute malicious code with the rights of the victim, warn the developers.

So far they have According to their own statements, no attacks were observed. The version equipped against such attacks VLC 3.0. 12 has been released for Linux, macOS and Windows. A security researcher from NSFOCUS discovered the vulnerabilities.

(des)

Read the full article at Heise.de

brands: Case Scenario  CODE  Com  It  linux  Windows  
media: Heise.de  
keywords: Windows  

Related posts


Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Related Products



Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91

Warning: Invalid argument supplied for foreach() in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91