Saturday, May 27, 2017
Hacked in Translation Demo
Check Point researchers demonstrate remote code execution using subtitles in Popcorn Time and Kodi
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years. Learn More http://blog.checkpoint.com/2017/05/23/hacked-in-translation/
https://kodi.tv/article/kodi-v172-minor-bug-fix-and-security-release
Labels:
info
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment