2,167
online users
thotties       tv/movies       gaming       gear       tech       guap       rides       eats       health       bxwf       misc

Malicious Subtitles Threaten Kodi, VLC and Popcorn Time Users



more
ADVERTISEMENT
 
topics gone triple plat - Number 1 spot 3X PLAT



section  1   0 bx goons and 1 bystanders Share this on Twitter       Share this on Facebook
 

section tech
  

 7 years ago '17        #1
3563 page views
0 comments


xastey01 
avatar
Props total: 2067 2 K  Slaps total: 193 193
Malicious Subtitles Threaten Kodi, VLC and Popcorn Time Users
 

 
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.





What is it?

Perpetrators use various methods, also referred to as ‘attack vectors’, to deliver cyberattacks. These attack vectors can be divided into two major categories: Either the attacker persuades the user to visit a malicious website, or he tricks him into running a malicious file on his computer.
Our research reveals a new possible attack vector, using a completely overlooked technique in which the cyberattack is delivered when movie subtitles are loaded by the user’s media player. These subtitles repositories are, in practice, treated as a trusted source by the user or media player; our research also reveals that those repositories can be manipulated and be made to award the attacker’s malicious subtitles a high score, which results in those specific subtitles being served to the user. This method requires little or no deliberate action on the part of the user, making it all the more dangerous.
Unlike traditional attack vectors, which security firms and users are widely aware of, movie subtitles are perceived as nothing more than benign text files. This means users, Anti-Virus software, and other security solutions vet them without trying to assess their real nature, leaving millions of users exposed to this risk.





What is the root cause?

The attack vector relies heavily on the poor state of security in the way various media players process subtitle files and the large number of subtitle formats. To begin with, there are over 25 subtitle formats in use, each with unique features and capabilities. Media players often need to parse together multiple subtitle formats to ensure coverage and provide a better user experience, with each media player using a different method. Like other, similar situations which involve fragmented software, this results in numerous distinct vulnerabilities.



What’s the effect?

Scope: The total number of the affected users is in the hundreds of millions. Each of the media players found to be vulnerable to date has millions of users, and we believe other media players could be vulnerable to similar attacks as well. VLC has over 170 million downloads of its latest version alone, which was released June 5, 2016. Kodi (XBMC) has reached over 10 million unique users per day, and nearly 40 million unique users each month. No current estimates exist for Popcorn Time usage, but it’s safe to assume that the number is likewise in the millions.

Damage: By conducting attacks through subtitles, hackers can take complete control over any device running them. From this point on, the attacker can do whatever he wants with the victim’s machine, whether it is a PC, a smart TV, or a mobile device. The potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, ma$s Denial of Service attacks, and much more.



Which media players are affected?

To date, we tested and found vulnerabilities in four of the most prominent media players: VLC, Kodi, Popcorn Time and Stremio. We have reason to believe similar vulnerabilities exist in other media players as well. We followed the responsible disclosure guidelines and reported all vulnerabilities and exploits to the developers of the vulnerable media players. Some of the issues were already fixed, while others are still under investigation. To allow the developers more time to address the vulnerabilities, we’ve decided not to publish any further technical details at this point.

Platforms Update:

PopcornTime– Created a Fixed version, however it is not yet available to download in the official website.
The fixed version can be manually downloaded via the following link: ↪ https://ci.popcorntime.sh .. me-Desktop/249

Kodi– Created a fix version, which is currently only available as source code release. This version is not yet available to download in the official site.
Link to the source code fix is available here: ↪ https://github.com/xbmc/xbmc/pull/12024

VLC– Officially fixed and available to download on their website
Link: ↪ http://get.videolan.org/v .. .5.1-win32.exe

Stremio– Officially Fixed and avilable to download on their website
Link: ↪ https://www.strem.io/


IPS Signatures:

Popcorn Time Subtitles Remote Code Execution

Kodi Open Subtitles Addon Remote Code Execution

VLC ParseJSS Null Skip Subtitle Remote Code Execution

Stremio Subtitles Remote Code Execution


How can this attack vector spread?

Delving even further into the subtitle supply chain produced some interesting results. There are a number of shared online repositories, such as OpenSubtitles.org, that index and rank movie subtitles. Some media players download subtitles automatically; these repositories hold extensive potential for attackers. Our researchers were also able to show that by manipulating the website’s ranking algorithm, we could guarantee crafted malicious subtitles would be those automatically downloaded by the media player, allowing a hacker to take complete control over the entire subtitle supply chain, without resorting to a Man in the Middle attack or requiring user interaction. This vulnerability also affects users who use these rankings to decide which subtitles to download manually.




 http://blog.checkpoint.co .. n-tr@nslation/

Was annoying to find the details.

Looks like PopcornTime was rendering subtitle text as HTML, inside their app (html/js-based), creating an XSS vector (looking at ↪ https://github.com/popcor .. sktop/commit/a..., ↪ https://github.com/butter .. sktop/pull/602). Likely the javascript runtime they're using allows file access and execution of arbitrary executables, enabling the metasploit shell shown in the demo.

For VLC there are a bunch of out of bound reads and heap buffer overflows.

f2b1f9e subtitle: Fix potential heap buffer overflow
611398f subtitle: Fix potential heap buffer overflow
ecd3173 subsdec: Fix potential out of bound read
62be394 subsdec: Fix potential out of bound read
775de71 subtitle: Fix invalid double increment.


The article implies that VLC and the others are affected by the same issue (leading to code execution), but according to available information it seems to be completely different issues.


The Kodi issue was a zip archive path traversal (i.e. no protection against zip files extracting files to parent directories).


Last edited by xastey01; 05-24-2017 at 07:14 AM..



icon
best
icon
worst
0 comments

say something...

ADVERTISEMENT
Sign me up
 
 

yesterday...


most viewed right now
props+4115
Video inside This is Janet Jackson. She will be 58 this year 💋
69 comments
1 day ago
@hiphop
most viewed right now
props+3313
Post A Moment That Finished An Artist Career
286 comments
1 day ago
@hiphop
most viewed right now
props+529
Video inside Man builds backyard bar to get away from his wife..
77 comments
1 day ago
@wild'ish
most viewed right now
6
Birdman and slim pull up to a drake j cole concert
22 comments
24 hours ago
@hiphop
back to top