21:02:48 9fd7a0 No.13556675[Watch Thread][Feature Thread][Show All Posts]
VideoLAN pointed ZDNet towards a Twitter feed in response, saying that "there is no security issue in [the] last version of VLC," and instead, a mistake from MITRE and CERT_BUND is at fault.
A serious vulnerability has been uncovered in the latest release of the VLC media player and no patch is available.
Non-profit VideoLAN's VLC player is popular software used to both play and convert a variety of audio and visual files. Available for Windows, Linux, Mac OS X, Unix, iOS, and Android systems, the open-source media player has now become the focus of a recent security advisory released by the German Computer Emergency Response Team (CERT-Bund).
"A remote, anonymous attacker can exploit the vulnerability in VLC to execute arbitrary code, cause a denial-of-service condition, exfiltrate information, or manipulate files," as noted by ESET.
The vulnerability is known to exist in the latest version of VLC on Windows, Linux, and Unix machines, but it is possible the bug is also present in past builds.
https://www.zdnet.com/article/remote-code-execution-vulnerability-in-vlc-remains-unpatched/