lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CADe7mMf_tEhfup5nYQ-yJg-GxQw-Y=71a0tg-VPzmLnupr4fhQ@mail.gmail.com>
Date: Mon, 22 Apr 2013 19:30:40 +0430
From: kaveh ghaemmaghami <kavehghaemmaghami@...glemail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: 0day Vulnerability in VLC (this is my first
 release of the vuln anywhere)

That was my mistake (publicly disclosure issues before notifying to the
vendor ) hope you don't wanna experience my mistake
you can also report to vul@...unia.com for your discovery and coordination
on your behalf
Regards
Kaveh


On Mon, Apr 22, 2013 at 7:18 PM, Henri Salo <henri@...v.fi> wrote:

> On Mon, Apr 22, 2013 at 07:31:07AM -0400, jay van wrote:
> > if VLC media player is launched in QT mode and the user is on windows NT
> > (any version of windows so far as tested) connected to the internet there
> > is a vulnerability in the handling of unicast packets. The Proof of
> concept
> > code is in development and should be ready for publishing within the
> next 2
> > weeks. More in depth vulnerability information will be released with the
> > proof of concept. This is a joint effort (the POC (proof of concept) code
> > and vuln discovery) by 2 security firms. 4sData IT solutions and another
> > firm that would like to remain nameless for the time being. This
> > vulnerability exposes almost everyone using VLC media player (unless on
> > linux systems and thats just because of the lack of testing so far may
> > still be found to be exposed.). Thank you for your time and if interested
> > please respond and let me know,.
> >
> >                  - Jay @ 4sData-IT-Solutions (www.4sdata.com - coming
> soon)
> >
> >   P.S. Launching 4sData this week to coincide with the VLC vuln.
>
> Please follow responsible disclosure and report issues first to the vendor
> and
> go public after waiting for a fix (or no reply). VLC usually replies to
> important issues very fast. Please contact me in case you need a hand in
> communication.
>
> ---
> Henri Salo
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iEYEARECAAYFAlF1TbYACgkQXf6hBi6kbk/OewCfcW7p+d1HM1K1w8TAWYRsjxm0
> 26AAnjGT+Xa9ITojsYqkh+zfn0fSfDCi
> =QJMP
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ