Security researchers have discovered a surprising new way for attackers to gain control of a machine: malicious subtitles. The vulnerability is device-independent, meaning it could be used to gain control of anything from an iPhone to a Mac.
The vulnerability was discovered by Check Point, which describes it as a significant risk.
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.
There is no evidence that this attack vector is yet in active use, but now that the possibility has been disclosed, it’s likely only a matter of time before the bad guys figure out the details and start using it.
Check Point said that the vulnerable code was found in many major media players, including VLC, Kodi, Stremio & PopcornTime. There are fixes available for all but Kodi, where the source code has been fixed but a runtime version is not yet available.
- PopcornTime– Created a Fixed version, however it is not yet available to download in the official website.
The fixed version can be manually downloaded via the following link: https://ci.popcorntime.sh/job/Popcorn-Time-Desktop/249
- Kodi– Created a fix version, which is currently only available as source code release. This version is not yet available to download in the official site.
Link to the source code fix is available here: https://github.com/xbmc/xbmc/pull/12024
- VLC– Officially fixed and available to download on their website
- Stremio– Officially Fixed and avilable to download on their website
The firm has put together a proof of concept based on a Windows machine, but stresses that all devices are vulnerable. While malware remains a relatively small problem for Apple users, it is not a risk which can be completely ignored.
FTC: We use income earning auto affiliate links. More.