тна Back to MegaDB Search

NarcFlagz | 155 points | May 23 2017 22:57:46

[META] PSA - Update VLC to 2.2.5+ now - Subtitle exploit found with remote code execution | Megalinks MegaDB [META] PSA - Update VLC to 2.2.5+ now - Subtitle exploit found with remote code execution

https://torrentfreak.com/malicious-subtitles-threaten-kodi-vlc-and-popcorn-time-users-researchers-warn-170523/

Please update to latest VLC or use MPC (there seems to be nothing about MPC having this exploit). Update your Kodi if you use that to play files as well. If you're not enabling subtitles, this exploit seems to not activate, but it's best to keep up to date anyway.


How to check VLC version: | Megalinks MegaDB How to check VLC version:

Shift + F1 OR Help > About.

How to update VLC: | Megalinks MegaDB How to update VLC:

https://www.youtube.com/watch?v=sg46VAD5ur8


How to check Kodi version: | Megalinks MegaDB How to check Kodi version:

https://www.youtube.com/watch?v=HxHqBDPGmUg


Download Latest VLC (32 and 64bit) [get the latest 2.2.5] | Megalinks MegaDB Download Latest VLC (32 and 64bit) [get the latest 2.2.5]

http://www.videolan.org/vlc/download-windows.en-GB.html

Latest Kodi (32bit) [17.2 fixes exploit] | Megalinks MegaDB Latest Kodi (32bit) [17.2 fixes exploit]

http://mirrors.kodi.tv/releases/win32/kodi-17.2-Krypton.exe

Media Player Classic [AFAIK this doesn't have exploit in] | Megalinks MegaDB Media Player Classic [AFAIK this doesn't have exploit in]

https://mpc-hc.org/

permalink


[-] AnkitIndia | 11 points | May 24 2017 00:40:06

I just checked for updates on VLC. It says the VLC is updated and no updates are available? EDIT: I am using VLC 2.2.4

permalink

[-] manemega | 9 points | May 24 2017 02:06:05

Go to their webpage and download the installer again, then run it, it will update it.

permalink

[-] SavageAlien | 5 points | May 24 2017 02:10:30

Same. Just grab it from the website. You'll probably get version 2.2.5.1 from the main download.

permalink

[-] Cristian_01 | 1 points | May 24 2017 04:06:33

so do i have to uninstall version 2.2.4 first? or just download the 2.2.5.1 ? would the new version automatically replace the old version? thanks

permalink

[-] jsdgjkl | 2 points | May 24 2017 10:24:03

you don't need yo uninstall just install the new version. also you can check if it worked by checking help -> about

permalink

[-] Cristian_01 | 2 points | May 24 2017 01:06:51

same here

permalink

[-] TheEvenDarkerKnight | 2 points | May 24 2017 01:15:13

same

permalink

[-] bumblebeebot | 11 points | May 24 2017 08:01:28

Stupid VLC says it has the latest version when it doesnt, had to update manually. Thanks for the warning.

permalink

[-] SourceDetective | 9 points | May 23 2017 23:17:11

This is a very dangerous exploit. Thank you. Updating now!

permalink

[-] RAWRzilla22 | 9 points | May 24 2017 05:28:36

PotPlayer has outperformed VLC for me in very nearly every way I have thrown at it. I HIGHLY ADVOCATE ITS USE :)

permalink

[-] harryharpratap | 4 points | May 24 2017 07:38:04

No linux support though :(

permalink

[-] RAWRzilla22 | 2 points | May 24 2017 09:04:23

Yeah, it's made by a Korean dude who mostly speaks no English, so there's your downside

permalink

[-] slash9492 | 4 points | May 24 2017 14:30:47

and it needs external codecs to play some videos

permalink

[-] cuab | 1 points | May 24 2017 05:43:35

HIGHLY RECOMMEND POT PLAYA.

permalink

[-] generalecchi | 1 points | May 24 2017 06:25:38

Is there a way to change the UI's size ? It's kinda small

permalink

[-] carlthescorp | 1 points | May 24 2017 13:20:39

I've had to reboot my comp before and the issue was resolved

permalink

[-] tellmyWIFIhateher | 1 points | May 29 2017 09:05:55

I contacted the developer and he told me that potplayer is safe considering this issue.

permalink

[-] morphagentOG | 7 points | May 24 2017 02:24:59

Thanks for the heads up! This sub is the shit because of users like yourself. Upvote for u.

permalink

[-] koopadekid | 6 points | May 24 2017 14:43:25

it just updated again so now the latest is 2.2.6

permalink

[-] clrksml | 4 points | May 24 2017 08:03:23

Good thing I don't watch videos on my pc. I watch all mine on plex through my roku box.

permalink

[-] halolordkiller3 | 0 points | May 24 2017 12:50:02

My brain... it hurts

permalink

[-] [deleted] | 1 points | May 24 2017 13:37:52

[deleted]

permalink

[-] halolordkiller3 | 1 points | May 24 2017 13:59:25

Ok lol I thought you were like nah man I use plex which has no bearing on kodecs lol

permalink

[-] zbxr81 | 3 points | May 24 2017 00:21:52

PotPlayer OK?

permalink

[-] DeGoatZen | 1 points | May 24 2017 06:26:32

1.7.1988 does not include a fix according to their changelog.

Checkpoint researchers only contacted VLC, kodi, and popcorn time. but all media players are vulnerable.

edit: not every single media player in existence is vulnerable of course. but you should probably avoid using anything that isn't 100% immune to the vulnerability for a bit, or avoid using subtitles.

permalink

[-] zbxr81 | 1 points | May 24 2017 06:36:51

Are you sure ALL media players are vulnerable? It seems like that would only be the case if all the projects were reusing code that contained the same vulnerability, like a library for processing subtitles. I mean, that's not impossible, especially with open source projects like VLC, but it seems like you could also have software that has its own separate code for handling subtitles that doesn't have the vulnerability ... I dunno.

permalink

[-] DeGoatZen | 1 points | May 24 2017 07:04:21

yes, read the checkpoint blog. they only tested on the most commonly used media players but they believe that there are other vulnerable

edit: not every single media player in existence is vulnerable of course. but you should probably avoid using anything that isn't 100% immune to the vulnerability for a bit, or avoid using subtitles.

permalink

[-] BetrayerOfBetrayers | 0 points | May 24 2017 15:05:56

they believe that there are other vulnerable

In other words: They don't know. But still decide to spread FUD.

permalink

[-] IzekG | 3 points | May 24 2017 02:46:07

Done and done even though I use MPC!

permalink

[-] sirber | 1 points | May 24 2017 12:54:45

Is it me or MPC-HC hasn't been updated in ages?

permalink

[-] simplefilmreviews | 3 points | May 24 2017 14:20:38

Default skin for VLC is hideous! Shame they don't update it. (obviously you can change it via skins, which I did, but man that default one doe)

permalink

[-] buon_ngu | 1 points | May 28 2017 04:18:55

What skin do you recommend? I never changed it before, but now that I know it's an option I'm really keen on doing so.

permalink

[-] simplefilmreviews | 2 points | May 28 2017 13:51:30

http://www.videolan.org/vlc/skins.html

I use dark lounge (top right)! (I seriously hate the default skin, it's hideous)

permalink

[-] MiscellaneousZed | 2 points | May 23 2017 23:47:51

Anyone know if this affects those running Linux distros? There doesn't appear to be a (stable) release of anything higher than 2.2.2 for Ubuntu. I updated to the testing 3.0.0, to be safe, but I'm not thrilled about having to run the testing version.

permalink

[-] NoMoreNicksLeft | 5 points | May 24 2017 05:33:25

Anyone know if this affects those running Linux distros?

Buffer overflows are generally possible in all software that hasn't specifically been written to avoid them.

However, it is a very targeted attack. A buffer overflow exploit that will seize control of your Windows machine will, at most, just crash VLC on a linux machine. And vice versa.

And it's very narrow too... has to be a specific version of windows, or at most a small range of closely-related versions. On linux, it will only work against a specific kernel version (or whatever component it is exploiting to elevate privileges).

If someone has a proof of concept trojan for windows, you're moderately safe on linux... at least until someone decides to try the same on that os. Of course, by the time you hear about that one, it might be too late.

permalink

[-] NarcFlagz | 2 points | May 24 2017 00:09:21

Not sure yet. It was only shown on windows, but you never know what can happen.

permalink

[-] 5835 | 2 points | May 24 2017 02:50:57

You should be safe using mpv.

permalink

[-] GabeReal | 2 points | May 25 2017 00:44:53

There's the tarball, if you want to go old school. Latest tarball is 2.2.6

permalink

[-] MiscellaneousZed | 2 points | May 25 2017 02:59:55

Whoa, after looking up how to compile that, I think it's a bit out of my league. Might have to look into that a little more-- see if I can learn something.

permalink

[-] GabeReal | 2 points | May 25 2017 11:06:31

Yeah, it's not easy. It sounds easy, just ./configure then make then sudo make install, but it rarely goes that easy.

permalink

[-] rednight39 | 2 points | May 23 2017 23:55:19

Wow--that youtube video is scary!

permalink

[-] ChillingInTraffic | 2 points | May 24 2017 01:08:42

Would this matter if I'm using Kodi on a Fire Stick?

permalink

[-] GabeReal | 1 points | May 25 2017 00:37:04

It's never a bad idea to update your software, generally speaking.

permalink

[-] prokenyan | 2 points | May 24 2017 05:57:37

Soda Player all the way upp

permalink

[-] n1ckus | 2 points | May 24 2017 13:55:27

Should i delete all my .SRT subtitiles i have?

permalink

[-] NarcFlagz | 3 points | May 24 2017 17:32:29

No. Just keep things updated.

permalink

[-] GabeReal | 3 points | May 25 2017 00:32:27

From reading about it this morning, it sounds like the exploit uses subtitle files that are made using bitmaps. Text files that make the video player render the text onto the screen (like srt files) are fine. In fact, switching to text-based subtitles like srt files exclusively will help keep the exploit from being used on your video player until you can update it.

permalink

[-] MiscellaneousZed | 2 points | May 25 2017 03:01:04

Thanks for that information. Good stuff to know.

permalink

[-] weatherwizard_pxw | 1 points | May 24 2017 04:39:08

would this impact Kodi from the Windows Store app? considering they do auto updates and all

permalink

[-] [deleted] | 1 points | May 24 2017 07:23:56

[deleted]

permalink

[-] GabeReal | 2 points | May 25 2017 00:34:40

If you use pre-rendered subtitles, you stand a risk of being exploited. If your subtitle files are all text, they won't hurt you. But don't put off updating your video player.

permalink

[-] DarkmessageCH | 1 points | May 24 2017 13:19:43

As far as I can tell, yes. The bug was found a few months ago and the developers were informed. Thus a few of them already fixed the bug. So your subtitles could already be malicious...

permalink

[-] BetrayerOfBetrayers | -1 points | May 24 2017 15:03:47

The "researchers" are mostly spreading FUD. They found a few vulnerabilities in VLC and other movie players which could be used by exploits, but they don't know if such exploits exist in the wild. Their video is really thin on details, too. So keep calm and ~~carry on~~ switch to mpv.

permalink

[-] Cristian_01 | 3 points | May 24 2017 16:51:12

so why MPV and not VLC?

permalink

[-] BetrayerOfBetrayers | 1 points | May 24 2017 17:12:05

mpv is much better than vlc (although vlc sure has improved over the last couple of years): faster, slicker, more configurable.

permalink

[-] WickedDemiurge | 3 points | May 24 2017 23:58:43

The correct time to patch to a version that fixes vulnerabilities is precisely before exploits exist in the wild.

permalink

[-] KaronteNoKami | -17 points | May 24 2017 01:45:35

LOL @ vlc users

permalink

[-] joshmaaaaaaans | 6 points | May 24 2017 02:17:30

but y doe?

permalink

[-] GabeReal | 4 points | May 25 2017 00:36:09

It's the internet, and /u/karontenokami needs to feel superior to something

permalink

[-] generalecchi | 2 points | May 24 2017 05:57:02

VIVA VLC MOTHERFUCKER !

permalink