![]() ![]() ![]() While details of the vulnerability are scant, CERT-Bund said that the flaw stems from an improper restriction of operations within the bounds of a memory buffer. Despite the level of severity, no patch is currently available for the vulnerability. Further, this loophole can be used to trigger a denial-of-service attack, a widely found malware.ĬERT-Bund has given this a base vulnerability score of 9.8 out of 10 and it exists in the Windows, Linux and UNIX versions of VLC 3.0.7.1 (the latest version of the media player). ![]() The security flaw allows for remote code execution, which gives hackers total access to your computer to install, run, and modify anything on it without your knowledge. You might want to uninstall it until the folks at the VideoLAN Project can patch the flaw. One of the most popular media players out there, VLC is widely used by everyone because it's free and offers a wide range of codec libraries, unlike the default Windows Media Player.Īvailable for Windows, Linux, Mac OS X, Unix, iOS, and Android systems, the open-source media player has now become the focus of a recent security advisory released by the German Computer Emergency Response Team (CERT-Bund).ĭue to a detected vulnerability, a very serious security flaw has been discovered in VLC. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |