Malicious code loopholes in VLC player plugged
Source: Heise.de added 21st Jan 2021In the current version of the VLC Player, the developers have closed several security holes.
(Image: Tatiana Popova / Shutterstock.com)
The media player VLC Player has been released in a secured version. Users should update the application quickly. If attacks are successful, in the worst case scenario attackers could execute malicious code.
In a security warning, the developers write of several vulnerabilities, but do not mention CVE numbers and risk classifications. If a victim opens media files prepared by an attacker, this can lead to storage errors. The application then crashes. But it could also happen that attackers execute malicious code with the rights of the victim, warn the developers.
So far they have According to their own statements, no attacks were observed. The version equipped against such attacks VLC 3.0. 12 has been released for Linux, macOS and Windows. A security researcher from NSFOCUS discovered the vulnerabilities.
(des)
brands: Case Scenario CODE Com It linux Windows media: Heise.de keywords: Windows
Related posts
Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88
Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88
Related Products
Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91
Warning: Invalid argument supplied for foreach() in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91