{"id":10531,"date":"2019-07-20T11:24:15","date_gmt":"2019-07-20T09:24:15","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=10531"},"modified":"2023-09-09T21:59:24","modified_gmt":"2023-09-09T19:59:24","slug":"critical-vulnerability-in-vlc-player-up-to-v3-0-7-1","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/07\/20\/critical-vulnerability-in-vlc-player-up-to-v3-0-7-1\/","title":{"rendered":"Critical vulnerability in VLC player up to V3.0.7.1"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Tor\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/01\/vlc_thumb.jpg\" alt=\"Sicherheit\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/07\/20\/bsi-warnt-vor-schwachstelle-im-vlc-player-bis-v3-0-7-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]In all current versions of the VLC Player up to V3.0.7.1, there is a critical vulnerability that allows a Denial of Service attack. The German BSI has issued a warning. <strong>Update<\/strong>: This was a false flag &#8211; there was no vulnerability in current VLC player versions &#8211; details inside.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/467ca8260ebc4c9f8858d1b77ffcb08e\" alt=\"\" width=\"1\" height=\"1\" \/>VLC Media Player is a program for playback of multimedia files and network streams. It is available for free on the Video LAN website and is quite popular. The VLC Media Player is available for Windows, macOS, Linux, Android etc.<\/p>\n<h2>Warning of German BSI<\/h2>\n<p>German BSI (Bundesamt f\u00fcr Sicherheit in der Informationstechnologie) warns within this document about a critical Denial of Service vulnerability in all VLC player versions up to v3.0.7.1. A remote, anonymous attacker can exploit a vulnerability in VLC to crash the program. A modified file must be opened to exploit the vulnerability.<\/p>\n<p>The BSI refers to this <a href=\"https:\/\/web.archive.org\/web\/20210121150603\/https:\/\/www.securityfocus.com\/bid\/109158\/info\" target=\"_blank\" rel=\"noopener noreferrer\">security focus entry<\/a>, which reported a VideoLAN VLC CVE-2019-13602 Heap Based Buffer Overflow Vulnerability for all VLC Player versions as of June 14, 2019.<\/p>\n<p>Unfortunately, B\u00fcrgerCERT recommends the timely installation of the security updates provided by the manufacturer in order to close the vulnerabilities. However, there is no updated version of the VLC Player higher than version 3.0.7.1.<\/p>\n<h2>Details about the bug<\/h2>\n<p>The National Vulnerability Database (NVD) <a href=\"https:\/\/web.archive.org\/web\/20191009192642\/https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13615\" target=\"_blank\" rel=\"noopener noreferrer\">classifies the vulnerability<\/a> with a 9.8 base score as critical. Here is the entry from NVD.<\/p>\n<blockquote><p>VideoLAN VLC media player 3.0.7.1 has a heap-based buffer over-read in mkv::demux_sys_t::FreeUnused() in modules\/demux\/mkv\/demux.cpp when called from mkv::Open in modules\/demux\/mkv\/mkv.cpp.<\/p><\/blockquote>\n<p>A heap buffer overflow occurs there in the MKV module, so that read pointers can point to external memories. The error occurs after my interpretation when opening and decoding MKV files. However, I came across <a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2019-13602\/\" target=\"_blank\" rel=\"noopener noreferrer\">this entry<\/a>, which might relativize it. There you can find the text for CVE-2019-13602:<\/p>\n<blockquote><p>An Integer Underflow in MP4_EIA608_Convert() in modules\/demux\/mp4\/mp4.c in VideoLAN VLC media player through 3.0.7.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and crash) or possibly have unspecified other impact via a crafted .mp4 file.<br \/>\nPublish Date : 2019-07-14 Last Update Date : 2019-07-15<\/p><\/blockquote>\n<p>which is contrary to the above message in the National Vulnerability Database. It also reports a problem in MP4 files and gives a CVS score of 6.8 for the Denial Of ServiceOverflow. A possible explanation of the discrepancy can be found <a href=\"https:\/\/www.heise.de\/forum\/heise-Security\/News-Kommentare\/Vorsicht-Kritische-Schwachstelle-in-aktueller-Version-des-VLC-Media-Player\/Betrifft-nur-MKV\/thread-6060979\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>German site heise reports <a href=\"https:\/\/www.heise.de\/security\/meldung\/Vorsicht-Kritische-Schwachstelle-in-aktueller-Version-von-VLC-Media-Player-4475712.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> that no attack scenarios are known. At the moment the developers of the Video LAN project are still working on a bugfix. On GitHub there is a <a href=\"https:\/\/web.archive.org\/web\/20221005031027\/https:\/\/git.videolan.org\/?p=vlc.git;a=commit;h=8e8e0d72447f8378244f5b4a3dcde036dbeb1491\" target=\"_blank\" rel=\"noopener noreferrer\">first commit<\/a> for this bug since June 27, 2019. It is unclear when an updated version of the VLC player will be released.<\/p>\n<h3>Allegedly patch, VLC developers can not reproduce bugs<\/h3>\n<p><strong>Addendum:<\/strong> I just saw two pieces of information on Twitter. The following tweet is supposed to be about a patch.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">VLC HAS A PATCH, THIS ONE IS APPARENTLY BAD, PATCH NOW:<\/p>\n<p>ICYMI: <a href=\"https:\/\/twitter.com\/SBSDiva?ref_src=twsrc%5Etfw\">@SBSDiva<\/a> <a href=\"https:\/\/twitter.com\/AdminKirsty?ref_src=twsrc%5Etfw\">@AdminKirsty<\/a> <a href=\"https:\/\/twitter.com\/thurrott?ref_src=twsrc%5Etfw\">@thurrott<\/a> <a href=\"https:\/\/twitter.com\/maryjofoley?ref_src=twsrc%5Etfw\">@maryjofoley<\/a> <a href=\"https:\/\/twitter.com\/bdsams?ref_src=twsrc%5Etfw\">@bdsams<\/a> <a href=\"https:\/\/twitter.com\/mehedih_?ref_src=twsrc%5Etfw\">@mehedih_<\/a> <a href=\"https:\/\/twitter.com\/ruthm?ref_src=twsrc%5Etfw\">@ruthm<\/a> <a href=\"https:\/\/twitter.com\/SwiftOnSecurity?ref_src=twsrc%5Etfw\">@SwiftOnSecurity<\/a> <a href=\"https:\/\/twitter.com\/pcper?ref_src=twsrc%5Etfw\">@pcper<\/a> <a href=\"https:\/\/twitter.com\/MalwareJake?ref_src=twsrc%5Etfw\">@MalwareJake<\/a> <a href=\"https:\/\/twitter.com\/JobCacka?ref_src=twsrc%5Etfw\">@JobCacka<\/a> <a href=\"https:\/\/twitter.com\/etguenni?ref_src=twsrc%5Etfw\">@etguenni<\/a><a href=\"https:\/\/t.co\/pv9EZGlXTH\">https:\/\/t.co\/pv9EZGlXTH<\/a><\/p>\n<p>\u2014 Crysta T. Lacey (@PhantomofMobile) <a href=\"https:\/\/twitter.com\/PhantomofMobile\/status\/1153667922956410880?ref_src=twsrc%5Etfw\">23. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The text says that the patch has been in progress for 4 weeks and is 60% ready &#8211; but will not be rolled out yet. Quote:<\/p>\n<blockquote><p>VLC Media Player's developer, the non-profit organisation VideoLAN, is currently working on a patch that, it claims, is now 60 per cent complete. The company has been working on the fix for the past four weeks, according to the bug report by the company.<\/p><\/blockquote>\n<p>On the other hand, the second tweet on Twitter made by How-To Geek made me a little insecure<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">The VLC flaw isn't reproducible according to VLC's developers. VLC is fine. <a href=\"https:\/\/twitter.com\/videolan?ref_src=twsrc%5Etfw\">@videolan<\/a> <a href=\"https:\/\/t.co\/Mi8Z4z3bTZ\">https:\/\/t.co\/Mi8Z4z3bTZ<\/a> by <a href=\"https:\/\/twitter.com\/chrisbhoffman?ref_src=twsrc%5Etfw\">@chrisbhoffman<\/a><\/p>\n<p>\u2014 How-To Geek (@howtogeek) <a href=\"https:\/\/twitter.com\/howtogeek\/status\/1153813586138894343?ref_src=twsrc%5Etfw\">23. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The message: <a href=\"https:\/\/web.archive.org\/web\/20191009192642\/https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13615\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-13615<\/a> cannot be reproduced by video LAN developers. Here are their tweets:<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">Hey <a href=\"https:\/\/twitter.com\/MITREcorp?ref_src=twsrc%5Etfw\">@MITREcorp<\/a> and <a href=\"https:\/\/twitter.com\/CVEnew?ref_src=twsrc%5Etfw\">@CVEnew<\/a> , the fact that you NEVER ever contact us for VLC vulnerabilities for years before publishing is really not cool; but at least you could check your info or check yourself before sending 9.8 CVSS vulnerability publicly&#8230;<\/p>\n<p>\u2014 VideoLAN (@videolan) <a href=\"https:\/\/twitter.com\/videolan\/status\/1153715138333220864?ref_src=twsrc%5Etfw\">23. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">Did you even check this?<br \/>\nNo one can reproduce this issue here.<\/p>\n<p>\u2014 VideoLAN (@videolan) <a href=\"https:\/\/twitter.com\/videolan\/status\/1153715775217254400?ref_src=twsrc%5Etfw\">23. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This is of course bad &#8211; something is going wrong there.<\/p>\n<h2>VideoLAN developers explains the issue<\/h2>\n<p><strong>Addendum: <\/strong>The developers of the VideoLAN project have now revealed the secret. The following tweet names the details.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">About the \"security issue\" on <a href=\"https:\/\/twitter.com\/hashtag\/VLC?src=hash&amp;ref_src=twsrc%5Etfw\">#VLC<\/a> : VLC is not vulnerable.<br \/>\ntl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago.<br \/>\nVLC since version 3.0.3 has the correct version shipped, and <a href=\"https:\/\/twitter.com\/MITREcorp?ref_src=twsrc%5Etfw\">@MITREcorp<\/a> did not even check their claim.<\/p>\n<p>Thread:<\/p>\n<p>\u2014 VideoLAN (@videolan) <a href=\"https:\/\/twitter.com\/videolan\/status\/1153963312981389312?ref_src=twsrc%5Etfw\">24. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>PC Games has also <a href=\"https:\/\/www.pcgamer.com\/vlc-media-player-has-a-critical-security-flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a> with some details. The problem is a third-party library libebml that was shipped with older versions of Ubuntu, such as 18.04. There the bug was also reported to the VideoLAN project &#8211; which was the wrong addressee. In VLC Player V3.0.3 and higher the correct version of the library is included and everything is fine. Thanks to Markus for <a href=\"https:\/\/www.borncity.com\/blog\/2019\/07\/20\/bsi-warnt-vor-schwachstelle-im-vlc-player-bis-v3-0-7-1\/#comment-75296\" target=\"_blank\" rel=\"noopener noreferrer\">the comment.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]In all current versions of the VLC Player up to V3.0.7.1, there is a critical vulnerability that allows a Denial of Service attack. The German BSI has issued a warning. Update: This was a false flag &#8211; there was no &hellip; <a href=\"https:\/\/borncity.com\/win\/2019\/07\/20\/critical-vulnerability-in-vlc-player-up-to-v3-0-7-1\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1967],"class_list":["post-10531","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-vlc-player"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=10531"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10531\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=10531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=10531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=10531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}