The MKVToolNix contains a set of tools that phrases Matroska file format, the Matroska file extension .MKV for video, MK3D for stereoscopic video, MKA for audio-only files and MKS for subtitle-only files.
This vulnerability can be triggered by an attacker with a maliciously crafted MKV file that would allow an attacker to execute code in the context of the current user.
“While reading a new element, the parser attempts to validate the current element by checking if it has a particular valid value. If there is no such value , then the parser deletes the element since the read was invalid .”
Now the vulnerability fixed with MKVToolNix toolset version 28.2.0, users are advised to update with the recent versions.
Last week another critical code execution vulnerability identified in LIVE555 Streaming Media RTSP Server library used by VLC and other media players.