Tuesday, June 18, 2024

Critical Code Execution Vulnerability Found in MKVToolNix Tools that Parses MKV Files

A critical code execution vulnerability detected in MKVToolNix utility that used to create, inspect Matroska files(.mkv) on Linux, Windows, and other operating systems.

The MKVToolNix contains a set of tools that phrases Matroska file format, the Matroska file extension .MKV for video, MK3D for stereoscopic video, MKA for audio-only files and MKS for subtitle-only files.

The MKV files are actually the multimedia container format that incorporates audio, video, and subtitles into a single file, it was found in 2002.

Security researchers from Talos disclosed a use-after-free vulnerability tracked TALOS-2018-0694 (CVE-2018-4022) in MKVToolNix mkvinfo tool that handles the MKV file format.

This vulnerability can be triggered by an attacker with a maliciously crafted MKV file that would allow an attacker to execute code in the context of the current user.

The vulnerability was tested by researchers with MKVToolNix MKVINFO v25.0.0 that handles MKV file. The vulnerability occurs when the parser validates the current element for a particular value if there is no value then the delete operation triggers a use-after-free vulnerability.

“While reading a new element, the parser attempts to validate the current element by checking if it has a particular valid value. If there is no such value [1], then the parser deletes the element since the read was invalid [2].”

Now the vulnerability fixed with MKVToolNix toolset version 28.2.0, users are advised to update with the recent versions.

Last week another critical code execution vulnerability identified in LIVE555 Streaming Media RTSP Server library used by VLC and other media players.


Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles