FFmpeg Multiple Vulnerabilities
Last Update Date:
17 Sep 2013 10:33
Release Date:
17 Sep 2013
4057
Views
RISK: Medium Risk
TYPE: Clients - Audio & Video
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
- An error within the "avpriv_dv_produce_packet()" function (libavformat/dv.c) can be exploited to trigger an out-of-bounds memory read access and subsequently cause a crash.
- An error within the "smacker_decode_header_tree()" function (libavcodec/smacker.c) can be exploited to trigger an out-of-bounds memory access.
- An integer overflow error within the "smacker_read_packet()" function (libavformat/smacker.c) can be exploited to cause a heap-based buffer overflow.
- An error exists within the "cin_read_frame_header()" function (libavformat/dsicin.c).
- An error within the "g2m_load_cursor()" function (libavcodec/g2meet.c) can be exploited to corrupt memory.
- An integer overflow error within the "mpc8_parse_seektable()" function (libavformat/mpc8.c) can be exploited to cause a heap-based buffer overflow.
- A boundary error within the "decode_frame()" function (libavcodec/zmbv.c) can be exploited to cause a memory corruption.
- An error within the "decode_wave_header()" function (libavcodec/shorten.c) can be exploited to cause a crash.
Successful exploitation of vulnerabilities #3, #4, #5, #6, and #7 may allow execution of arbitrary code.
Impact
- Denial of Service
System / Technologies affected
- FFmpeg 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Fixed in the GIT repository.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with