As in title. What’s your experience with it? If something isn’t executable, then it has to exploit vulnerability in order to run anything malicious. But does it happen often with mp4, mkv and other files like mp3 or epub?

I assume that if I use updated linux, then I’m mostly safe?

  • Brickfrog@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    2
    ·
    2 years ago

    But does it happen often with mp4, mkv and other files like mp3 or epub?

    Typically is not possible. Those media files are basically just data files (e.g. like a .txt text file) so media players normally do not look for anything to execute inside them. And frankly people should avoid any media player attempting to execute random code found in media files.

    Case in point, the old Windows Media Player + old .wmv files used to be able to direct people to random websites to download/execute malware. Leave it to Microsoft to somehow turn a movie file into malware https://security.stackexchange.com/questions/106188/can-a-rogue-wmv-file-hijack-windows-media-player

    • plexnose@geddit.social
      link
      fedilink
      English
      arrow-up
      10
      ·
      2 years ago

      It’s not about a media player ‘attempting to execute random code’ - an exploit is found which lets it run a command that it shouldn’t. You used to be able to jailbreak phones by loading a .pdf file that used an exploit to gain root privileges and execute code. It wasn’t a feature of the PDF reader. It was a bug that could be exploited when a specific string of characters was entered to effectively crash the pdf reader and let it run its own code instead.

      A txt could easily contain malware - any file could.

      • miah@midwest.social
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 years ago

        PDF is a complicated format, and the hacking vectors are often thanks to embedded javascript, or vulnerabilities in the parsing libraries.

        ‘avi’ is technically a container format, kind of like ‘zip’, it can contain more than video/audio.

        That said, I’ve been pirating movies since the mid 1990’s and haven’t gotten hacked through a .avi/.mkv/etc. The ‘bad stuff’ was always in a obvious .exe/.bat or some sort of executable, but sometimes named to exploit people, eg ‘foomovie.avi.exe’.

        If in doubt, run your videos using mplayer on Linux and not on Windows, most of that stuff tends to target the easier to exploit and more commonly deployed systems, eg Windows.

        • plexnose@geddit.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 years ago

          Yesh - the huge majority of malware in relation to piracy is from people deliberately running ‘setup.exe’ from some untrusted source, ignoring or overriding AV warnings and then wondering what went wrong. Its not from movie files and it certainly not from movie files on Linux.

      • Pulp@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 years ago

        True. This is something to worry when securing the network of a large corporation & governments. Not for the average pirate

    • scutiger@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 years ago

      More likely is a specific file-naming trick that lets you use right-to-left writing to make a file look like something it’s not. When it’s written backwards, you can make iva.scr look like rcs.avi, and the target will just think it’s a video file when it’s actually an executable. If you’re not paying attention, you may not notice that Windows Explorer shows a .avi extension but lists the file as an executable. Hell, if you open the file directly from your torrent app, it may not even list the file type at all. In effect, it’s not hiding a payload in a video file, just disguising the payload as a video file.