12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

See the following excerpt from the VLC build instructions:[..]Building VLC from the source code=================================[..]- natively on Windows, using cygwin (www.cygwin.com) with or without the POSIXemulation layer. This is the preferred way to compile vlc if you want to do it onWindows.[..]UNSUPPORTED METHODS-------------------[..]- natively on Windows, using Microsoft Visual Studio. This will not work.[..]At the time of this writing, VLC didn’t make use of any of theexploit mitigation techniques provided by Windows Vista or laterreleases. As a result, every bug in VLC under Windows is as easilyexploited today as 20 years ago, when none of these security featureswere widely deployed or supported.2.4 Lessons LearnedAs a programmer:• Never trust user input (this includes file data, network data, etc.).• Never use unvalidated length or size values.• Always make use of the exploit mitigation techniques offered bymodern operating systems wherever possible. Under Windows,software has to be compiled with Microsoft’s Visual C++ 2005SP1 or later, and the appropriate compiler and linker optionshave to be used. In addition, Microsoft has released the EnhancedMitigation Experience Toolkit, 15 which allows specific mitigation techniquesto be applied without recompilation.As a user of media players:• Don’t ever trust media file extensions (see Section 2.5 below).2.5 AddendumMonday, October 20, 2008Since the vulnerability was fixed and a new version of VLC is now available,I released a detailed security advisory on my website (Figure 2-10shows the timeline). 16 The bug was assigned CVE-2008-4654.22 Chapter 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!