cea-sec / sanzu

Graphical remote desktop solution
GNU General Public License v3.0
179 stars 27 forks source link

Sandbox video decoder #171

Open serpilliere opened 1 year ago

serpilliere commented 1 year ago

In the scenario in which the host runs the Sanzu server, the attacker may also control the video encoder. In this case, on the client side, the video decoder may receive a video stream data controlled by the attacker.

The client decoder code may be split out of the main code in order to sandbox it.

In this case, the video decoder may sandbox itself before parsing arbitrary data. Moreover, the video decoder could be forced to use software decoding: this will avoid having allowing the use of graphic drivers in the video decoder sandbox. As the decoding process is light compared to the encoding part, this may be acceptable from a performance point of view. (about half a cpu for the 1080p@25fps)