Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Check Point Discovers Media Subtitle Vulnerability Impacting Millions

    By
    SEAN MICHAEL KERNER
    -
    May 23, 2017
    Share
    Facebook
    Twitter
    Linkedin
      security threats

      Security firm Check Point Software Technologies publicly disclosed a new threat vector today in media player subtitles that could have potentially exposed millions of users to security risks. Simply by running a media file that downloads embedded malicious subtitles, Check Point alleges that end-user systems could have been taken over by attackers.

      Check Point responsibly disclosed the vulnerability to the impacted media players including VLC, Kodi (XBMC), Popcorn Time and Stremio, and updated players are now available. VLC in particular is a widely used open-source media player that has over 170 million downloads on Windows alone. Media players are also widely used in smart TV platforms and other streaming media devices, with the total number of impacted devices estimated to be 200 million by Check Point.

      In this attack the vulnerable media player loads a subtitle from a third party resource to provide a language translation for the user. According to Check Point, subtitles are treated as a trusted source by the media player and are often just text files, which are overlooked by common security tools including antivirus technologies.

      Though the attack vector has widespread risk implications, it’s not an attack that has been used in the wild to date.

      “We have done extensive analysis of millions of public subtitles and as far as we can tell this attack has not been used by anyone yet,” Omri Herscovici, Team Leader for Products Research and Development at Check Point told eWEEK.

      Herscovici explained that VLC is a program running on user systems that has the potential to do various things once it is installed. He added that enabling subtitles to take control of a system is obviously not supposed to happen, because its not what VLC is programmed to do. The vulnerability that Check Point discovered essentially enables an attacker to act maliciously using VLC’s permissions.

      The Check Point researchers were also able to determine that it is possible for an attacker to manipulate third party subtitle repositories to enable a malicious subtitle to automatically be downloaded to a media player.

      The process by which Check Point figured out that media subtitles could be used to attack user involved multiple tools and steps.

      “The vulnerabilities where found through various methods, either by manual auditing of the code, or by creating a fuzzing infrastructure instrumenting the tool AFL (American Fuzzy Lop),” Herscovici said.

      Herscovici said that Check Point contacted the VLC developers on April 5. VLC’s team was very responsive, he said, and has updated its media player to fix the bugs. For VLC, there were four specific vulnerabilities (CVE-2017-8310, CVE-2017-8311, CVE-2017-8312 and CVE-2017-8313) that have been patched.

      For end-users, the best way to limit the risk of any sort of media subtitle attack is to update their media players.

      “Since new vulnerabilities come and go all the time, there isn’t really bullet proof solution aside from making sure the software is always up-to-date, Herscovici said.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×