![]() Just ensure you're looking out for over-the-air updates from them. For now, we'll just have to wait for VideoLan to release a patch and fix the gap. The bug in question allegedly only affects Windows, Unix, and Linux versions of VLC and is affecting only. If you're using VLC on a Mac, you are fine. Earlier in June, two high-severity bugs were patched in the media player and were discovered after a EU-mandated bug bounty program was announced. While details of the vulnerability are scant, CERT-Bund said that the flaw stems from an improper restriction of operations within the bounds of a memory buffer. Despite the level of severity, no patch is currently available for the vulnerability. Further, this loophole can be used to trigger a denial-of-service attack, a widely found malware.ĬERT-Bund has given this a base vulnerability score of 9.8 out of 10 and it exists in the Windows, Linux and UNIX versions of VLC 3.0.7.1 (the latest version of the media player). ![]() The security flaw allows for remote code execution, which gives hackers total access to your computer to install, run, and modify anything on it without your knowledge. You might want to uninstall it until the folks at the VideoLAN Project can patch the flaw. One of the most popular media players out there, VLC is widely used by everyone because it's free and offers a wide range of codec libraries, unlike the default Windows Media Player.Īvailable for Windows, Linux, Mac OS X, Unix, iOS, and Android systems, the open-source media player has now become the focus of a recent security advisory released by the German Computer Emergency Response Team (CERT-Bund).ĭue to a detected vulnerability, a very serious security flaw has been discovered in VLC. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |