ffmpeg is vulnerable to out-of-bound reads. It happens because there is a discrepancy in the buf_size
used to calculate “bytestream_end” and the “size” returned from the AV_RB24()
function. A malicious user can pass a mp4 file to the system to trigger an out of array read.
CPE | Name | Operator | Version |
---|---|---|---|
ffmpeg | le | 2.8.3 | |
ffmpeg-up-to-date | le | 2.8.3 |
git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c20f4fcb74da2d0432c7b54499bb98f48236b904
seclists.org/oss-sec/2017/q4/189
www.openwall.com/lists/oss-security/2017/11/03/4
www.securityfocus.com/bid/101690
github.com/FFmpeg/FFmpeg/commit/d893253fcd93d11258e98857175e93be7d158708
lists.debian.org/debian-lts-announce/2019/01/msg00006.html
www.debian.org/security/2017/dsa-4049