• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

VLC Media Player is facing an issue of double-free vulnerability

{{postValue.id}}

A security researcher from Pen Test Partner, Symeon Paraschoudis discovered a security loophole in VLC media player that is a critical double-free vulnerability that organizes a platform for the hackers to perform arbitrary code execution on the preferred system. The arbitrary code execution is nothing but the capability of the hacker to work on the arbitrary code. Now arises the question of what is an arbitrary code? Arbitary code or command is the key through which the hacker performs illegal access on the desired system.

The double-free vulnerability is found to be a high severity bug with a CVSS c3 score of 9.8. The issue of double-free vulnerability was first tracked after the release of VLC 3.0.7. Through this technology, the hacker can also trigger a clash of VLC.

To avoid the hacking issues caused due to the double-free vulnerability in VLC the user should be conscious about accessing files from the untrusted files. The VLC media as it is a popular media player as it provides media streaming so the hackers are targeting on the VLC to extract the video information of the users. The hackers tempt the users to open a file and through the access of that particular file, the double-free vulnerability issue occurs.

To bring a solution to this problem VideoLan has introduced a security advisor and the people are advised to update the VideoLan version and also the administrators to monitor the issue compressed system. Zero-day was actively exploited by the hackers which are found in the firefox browser.

Tags:
caden
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ganesh Konka ?
Zentya 6.1 http proxy configuration

please send link for creating zentyal 6.1 for http proxy and firewall as gateway.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.