INTERACT FORUM

More => Old Versions => JRiver Media Center 22 for Windows => Topic started by: mbagge on May 28, 2017, 05:11:17 am

Title: Is MC vulnerable to the recent exploit in subtitle files?
Post by: mbagge on May 28, 2017, 05:11:17 am
I just had a few minutes of scary reading over at http //thehackernews.com/2017/05/movie-subtitles-malware.html where a company called Checkpoint describes how easy a hacker can specially craft an .SRT file to fool the subtitle engine to download and install malicious files on the computer.
Other mediacenter vendors have already been warned, VLC, Kodi (XBMC), Popcorn Time and Stremio. I wonder if JRiver did ?

Regards Michael
 
Title: Re: Is MC vulnerable to the resent found hacker exploit in subtitle files ?
Post by: ferday on May 28, 2017, 05:16:24 am
https://yabb.jriver.com/interact/index.php?topic=110753.0
Title: Re: Is MC vulnerable to the resent found hacker exploit in subtitle files ?
Post by: mbagge on May 28, 2017, 05:25:20 am
Thanks a lot :)
I missed that post even that I tried to look for such ones.