logo

Software Exploitation - VLC

   

Added on  2021-01-01

13 Pages3382 Words419 Views
Software Exploitation
Software Exploitation - VLC_1
Table of Contents
INTRODUCTION...........................................................................................................................3
TASKS.............................................................................................................................................3
The Vulnerabilities and weakness of VLC multiplayer within the system environment..........3
Analyse and evaluate the systems or networks for the exploitation ..........................................6
Understanding the counter measures against the exploitation technique....................................7
Evaluate the secure system design and software protection methods.........................................9
RECOMMENDATION.................................................................................................................10
CONCLUSION..............................................................................................................................11
REFERENCES..............................................................................................................................12
Software Exploitation - VLC_2
INTRODUCTION
Software exploitation is basically finding the flaws such as overflow of buffer, applicable
the use of free in the software product or exploitation them. The purpose of project to find the
vulnerabilities and weakness of VLC multimedia player within the system environment. VLC
media player is the best example of software exploitation which based on the open source
platform multimedia player and framework that plays important role in terms of optic media and
various type of streaming protocols. This report will describe the Vulnerabilities and weaknesses
which affects VLC multimedia player in the platform such as Windows. Furthermore, this
assignment will discuss about t
TASKS
The Vulnerabilities and weakness of VLC multiplayer within the system environment
VLC is a free and open source cross platform multimedia player or frame work that plays
important role in the multimedia files such as Audio, VCDs, DVD and different type of
streaming protocols.
Vulnerabilities have been discovered in the different version of VLC media player which
may allows corrupting for cyberattacker to easily corrupt the memory. It also executes the
arbitrary code for running the system application in proper manner (Al-Serhani & et.al., 2018).
According to the videosLan project is based on the community of non profit developer those who
will create one of the open source media tools for people. VLC is also the popular and well
known results of project which act as cross platform multimedia player. This framework is
performed different roles in the multimedia files such as VCDs, DVDs, Audio CDs etc.
VLC media player is supports the window's system that can use for all time. It is non
profit organization behind the VLC media players that mange all the desktop operating system.
A vulnerability is the main threat in the VLC media player on windows which is very
critical to handle the system. It has been found the issue in the processing of file and
manipulation within the unknown inputs that lead to corrupt the memory vulnerability. In
videolan.org, it identifying the vulnerability and attack may be initiated remotely. There is not
form of authentication needed for the successful exploitation.
Software exploitation-
Class – Memory corruption
Remote- Yes
Software Exploitation - VLC_3
Status – Highly functional processing
Local- No
Access- Public
Programming language- C++
Price of exploitation- USD $0-$6k at the moment (calculate the estimations)
This media player is improved the playback for different formats such as apple lossless
audio and MKV files etc.
Codec and other party library can update that help for improve the playback and their
overall quality.
This system is improved the parsing of vimeo playlist and other SRT subtitle or HTML.
There are various type of operating system improvement and also fixes that have made to the
new version of player. There are different platform support this system application such as
windows and Mac OS etc. The users of media player should install the latest version of
application in the operating system which possible to easily fix all the security vulnerabilities.
Vulnerabilities:
It needs for parsing an invalid MKV file but their input validations are insufficient. In this
way, A malicious third party will able to perform execution of arbitrary code.
Illustration 1
Software Exploitation - VLC_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of the VLC Media Player
|8
|2290
|428

Research Methodology and Practice
|9
|2011
|226