So, a reporter, opened a bug on our bugtracker, which is outside of the reporting policy, aka, mail us in private on the security alias. Of course, our bugtracker is public. We could not, of course reproduce the issue, and tried to contact the security researcher, in private.
-
- Show this thread
-
The reporter is using Ubuntu 18.04, which is an old version of Ubuntu, and clearly has not all the updated libraries. But did not answer to our questions.
Show this thread -
For whatever reason, unknown to us,
@MITREcorp decided to issue a CVE, without talking to us. This is in direct violation of their own policies, https://cve.mitre.org/cve/researcher_reservation_guidelines#researcher_reservation_guidelines#1 …pic.twitter.com/8AZWpimNBCShow this thread -
This is not the first time that
@MITREcorp does that. In fact, they NEVER EVER contact us when they find security issues on VLC, and we always discover that after they are public, when a user or a distribution asks us.Show this thread -
When we complained, and we asked if we could manage our own CVE (like another CNA), we had no answer and
@usnistgov NVD told us that they basically couldn't do anything for us, not even fixing the wrong information.Show this thread -
And this has been going on for years: almost all CVE on VLC have completely insane CVSS, which brings articles like the one we've seen.
Show this thread -
Any non-exploitable read overflow get CVSS of 9.8, like VLC is a server and you could do RCE and compromised the machine, while most of the time, the issue is a crash, often not exploitable, from a local file that the user HAS to open manually.
Show this thread -
And of course, they are never corrected.
Show this thread -
Then, this time, for whatever reason,
@certbund decided to do an advisory https://www.cert-bund.de/advisoryshort/CB-K19-0634 …, without checking either the crash (it's not hard), or the vulnerability, or even contacting us.Show this thread -
And of course,
@certbund did not contact us for clarifications.Show this thread -
So, when
@certbund decided to do their "disclosure", all the media jumped in, without checking anything nor contacting us.Show this thread -
You can bet that noone of them will correct their article, or it will be in a small subtweet somewhere hidden.
Show this thread - Show this thread
-
@BFMTV joined of course, with the ridiculous "60%" of the fix is done, which is what the reporter added in the public bugtracker...Show this thread -
And to finish, both
@usnistgov NVD and@MITREcorp were contacted more than 12 hours, (7pm CET) and we still are waiting for an answer, while@elpaisinenglish is asking us for clarifications...Show this thread -
Would
@MITREcorp behave the same way if we were Microsoft or another big company? But no, we're just a small non-profit, that does not even have the money to pay someone fulltime... End-of-thread.Show this thread End of conversation
New conversation -
-
-
Please update your articles:
@Gizmodo@ZDNet@Neowin@LifehackerAU@fossbytes14@pcgamer@TheRegister -
FWIW we reported the VLC developers were skeptical. Happy to update our coverage accordingly. Tho, FWIW, the PoC .MP4 seg-faulted our 3.0.7 VLC installation.
-
using a linux distribution? with an old libebml?
-
Using Debian 9.9, using libebml4v5 1.3.4-1
-
Yes, so your issue is your distribution is not up-to-date, not VLC.
-
That is not accurate. Debian 9 is still supported, the Debian devs have not backported the fixes (yet) (see https://packages.debian.org/source/stretch/libebml …). Not saying that any of the above is untrue, simply that you cannot rely on up-to-date libraries on all platforms.
-
-
Yes that is correct. I recommend you look for which version of libebml fixes the issue and advise all people to check their versions of libebml - then you can avoid this blowing up by people tweeting "But the exploit works on my machine!!1!".
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.