Skip to main content

FFmpeg Multiple Vulnerabilities

Last Update Date: 17 Sep 2013 10:33 Release Date: 17 Sep 2013 3002 Views

RISK: Medium Risk

TYPE: Clients - Audio & Video

TYPE: Audio & Video

Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

  1. An error within the "avpriv_dv_produce_packet()" function (libavformat/dv.c) can be exploited to trigger an out-of-bounds memory read access and subsequently cause a crash.
  2. An error within the "smacker_decode_header_tree()" function (libavcodec/smacker.c) can be exploited to trigger an out-of-bounds memory access.
  3. An integer overflow error within the "smacker_read_packet()" function (libavformat/smacker.c) can be exploited to cause a heap-based buffer overflow.
  4. An error exists within the "cin_read_frame_header()" function (libavformat/dsicin.c).
  5. An error within the "g2m_load_cursor()" function (libavcodec/g2meet.c) can be exploited to corrupt memory.
  6. An integer overflow error within the "mpc8_parse_seektable()" function (libavformat/mpc8.c) can be exploited to cause a heap-based buffer overflow.
  7. A boundary error within the "decode_frame()" function (libavcodec/zmbv.c) can be exploited to cause a memory corruption.
  8. An error within the "decode_wave_header()" function (libavcodec/shorten.c) can be exploited to cause a crash.

Successful exploitation of vulnerabilities #3, #4, #5, #6, and #7 may allow execution of arbitrary code.


Impact

  • Denial of Service

System / Technologies affected

  • FFmpeg 2.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Fixed in the GIT repository.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link