[Cryptography] Citizenfour Snowden Documentary

Henry Baker hbaker1 at pipeline.com
Sun Jan 25 14:50:29 EST 2015


At 10:54 AM 1/25/2015, John Young wrote:
>Citizenfour Snowden Documentary (7-Zipped MP4, 1.2GB)
>
>http://cryptome.org/Citizenfour.7z 
>
>http://cryptome.org/2015/01/Citizenfour-Screengrabs-pdfs.7z
>
>Snowden releases tally: http://cryptome.org/2013/11/snowden-tally.htm 


Thanks!

We can only hope that MITM's can't produce "specially crafted" mp4 versions of Citizen4 ...  ;-)

http://www.zdnet.com/article/vlc-vulnerabilities-exposed/

VLC vulnerabilities exposed

Summary:Major memory corruption vulnerabilities have been discovered in the open-source VLC project.

By Charlie Osborne for Zero Day | January 20, 2015 -- 08:06 GMT (00:06 PST)
Follow @ZDNetCharlie

Vulnerabilities have been discovered in some versions of the popular VLC media player which may allow a cyberattacker to corrupt memory and potentially execute arbitrary code.

According to security researcher Veysel Hatas, who posted the discovery on Full Disclosure last week, one of the vulnerabilities is a DEP access violation vulnerability and the other is a write access flaw.

http://seclists.org/fulldisclosure/2015/Jan/72

The VideoLAN project is a community of non-profit developers who create open-source multimedia tools.  The VLC player is one of the most well-known results of this project, and acts as a cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.

The first security vulnerability, discovered on 24 November last year, is a flaw which is triggered as user-supplied input is not properly sanitized when handling a specially crafted FLV file.  The second vulnerability, much the same, is triggered as user-supplied input is not properly sanitized when handling a specially crafted M2V file -- both of which may be malicious and lead to a "context-dependent attacker corrupting memory and potentially executing arbitrary code."

Considered severe, the flaws are present on version 2.1.5 of VLC media player, and were tested through Windows XP SP3.  While this legacy operating system is no longer supported by Microsoft, many users worldwide have not yet updated and may be vulnerable.

The vulnerabilities were reported to the VideoLAN project on 26 December 2014, but no patch has been issued to fix the problem.



More information about the cryptography mailing list