barbaz wrote:
1) Is VLC media player (on Ubuntu 12.04) a potential vector for this attack?
...I meant, can it submit forms as described on the PoC page? If not, NoScript without the rule should be sufficient protection on script-forbidden stream pages (I can write a temporary exception to download a ram file, then stream that in VLC).
I'm not sure exactly what it can do, but generally native code can do pretty much whatever it wants.
However, I wouldn't think that radio streams normally execute active content. I think the author of the stream would have to find a way to compromise VLC (like a buffer overflow) to make it attempt this.
I've disabled the services I could find on this computer that listen for incoming connections.
Then you're probably OK. What services, if any, are still listening?
Remember, all this does is allow the attacker to begin an assault on something that would normally be unreachable behind your router. It doesn't automatically compromise your machine. So, if nothing is listening, then they can successfully begin an assault on a brick wall.
And since my Mac acts as a router for my VMs, could the port also open on my Mac, potentially resulting in an attack compromising my Mac, or will the traffic just hit the OS X firewall or forward to the VM (where it would be blocked)?
I'm pretty sure it would forward to the VM. I'm not a network specialist, though.
That most of them are being played through Flash, and I'm stuck on major version 11.2 on all my machines? Otherwise I know less than you do on that front.
I guess this is back to the core NoScript question of "Which sites should I trust?"