Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A New Zealand penetration tester found video editing software vulnerabilities that could allow frames to be injected into major Hollywood films.
Security-Assessment.com tester Nick Freeman dissected software used in some of Hollywood's most popular films - from script writing to post-production - find vulnerabilities.
He found that although no single software vendor controls the end-to-end process of film-making, "every part of the process has software that is vulnerable".
Most software fell to vulnerabilities within six hours of installation and only a few test subjects managing to avoid complete failure.
Once a vulnerability was found, Freeman contacted relevant engineers and executives at the companies to notify them of the bug and provide help on fixing the vulnerability. He scored them based on their helpfulness and willingness to help.
But worst of the lot was also one of the biggest.
Nick Freeman ranked non-linear editing software vendor Avid the worst of the bunch in addressing and fixing vulnerabilities.
Avid software was used in several major films including Iron Man 2, Avatar and Star Trek. Freeman was able to compromise a vulnerability in a recent version of its Media Composer suite within an hour of installation.
Freeman discovered a remote listening service in the editing software allowed him to overflow network requests, crashing the software.
While the vulnerability itself was not necessarily important, he said ensuing discussions with the vendor - one of the few tested to have a dedicated security team - proved fruitless.
"It was far too easy to exploit," he said.
"There have been two updates since then but the vulnerabilities are still there. I don't know if they'll ever get around to patching it."
None of Freeman's exploits were available to a remote user but it is believed similar bugs have been used in recent years to gain access to film footage prior to release.
Most were exploitable due to two-decade-old basic programming flaws.
"The vendor's main goal I guess is to have products with extensive functionality and with strict deadlines, and security falls off the road map in the process."
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.