Monday, November 4, 2024
HomeCyber Security NewsCritical Code Execution Vulnerability Found in MKVToolNix Tools that Parses MKV Files

Critical Code Execution Vulnerability Found in MKVToolNix Tools that Parses MKV Files

Published on

Malware protection

A critical code execution vulnerability detected in MKVToolNix utility that used to create, inspect Matroska files(.mkv) on Linux, Windows, and other operating systems.

The MKVToolNix contains a set of tools that phrases Matroska file format, the Matroska file extension .MKV for video, MK3D for stereoscopic video, MKA for audio-only files and MKS for subtitle-only files.

The MKV files are actually the multimedia container format that incorporates audio, video, and subtitles into a single file, it was found in 2002.

- Advertisement - SIEM as a Service

Security researchers from Talos disclosed a use-after-free vulnerability tracked TALOS-2018-0694 (CVE-2018-4022) in MKVToolNix mkvinfo tool that handles the MKV file format.

This vulnerability can be triggered by an attacker with a maliciously crafted MKV file that would allow an attacker to execute code in the context of the current user.

The vulnerability was tested by researchers with MKVToolNix MKVINFO v25.0.0 that handles MKV file. The vulnerability occurs when the parser validates the current element for a particular value if there is no value then the delete operation triggers a use-after-free vulnerability.

“While reading a new element, the parser attempts to validate the current element by checking if it has a particular valid value. If there is no such value [1], then the parser deletes the element since the read was invalid [2].”

Now the vulnerability fixed with MKVToolNix toolset version 28.2.0, users are advised to update with the recent versions.

Last week another critical code execution vulnerability identified in LIVE555 Streaming Media RTSP Server library used by VLC and other media players.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...