All the vulnerabilites related to libav - libav
cve-2017-17127
Vulnerability from cvelistv5
Published
2017-12-04 08:00
Modified
2024-08-05 20:43
Severity ?
Summary
The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:43:59.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1099"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127"
          },
          {
            "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-05T20:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1099"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127"
        },
        {
          "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17127",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1099",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1099"
            },
            {
              "name": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127",
              "refsource": "MISC",
              "url": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127"
            },
            {
              "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17127",
    "datePublished": "2017-12-04T08:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:43:59.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-9720
Vulnerability from cvelistv5
Published
2019-09-19 20:37
Modified
2024-08-04 22:01
Severity ?
Summary
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:01:53.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lgtm.com/security/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-19T20:37:41",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lgtm.com/security/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-9720",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161",
              "refsource": "MISC",
              "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161"
            },
            {
              "name": "https://lgtm.com/security/",
              "refsource": "MISC",
              "url": "https://lgtm.com/security/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-9720",
    "datePublished": "2019-09-19T20:37:41",
    "dateReserved": "2019-03-12T00:00:00",
    "dateUpdated": "2024-08-04T22:01:53.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2789
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.492Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2789",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2789",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2797
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being "large enough."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.416Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cca9528524c7a4b91451f4322bd50849af5d057e"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being \"large enough.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cca9528524c7a4b91451f4322bd50849af5d057e"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2797",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being \"large enough.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=cca9528524c7a4b91451f4322bd50849af5d057e",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=cca9528524c7a4b91451f4322bd50849af5d057e"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2797",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.416Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-9987
Vulnerability from cvelistv5
Published
2017-06-28 06:00
Modified
2024-08-05 17:25
Severity ?
Summary
There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:25:00.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1067"
          },
          {
            "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-06-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-02T10:06:04",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1067"
        },
        {
          "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-9987",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1067",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1067"
            },
            {
              "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-9987",
    "datePublished": "2017-06-28T06:00:00",
    "dateReserved": "2017-06-27T00:00:00",
    "dateUpdated": "2024-08-05T17:25:00.535Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-14372
Vulnerability from cvelistv5
Published
2019-07-28 18:44
Modified
2024-08-05 00:19
Severity ?
Summary
In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:41.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1165"
          },
          {
            "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-02T10:06:04",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1165"
        },
        {
          "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14372",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1165",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1165"
            },
            {
              "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14372",
    "datePublished": "2019-07-28T18:44:12",
    "dateReserved": "2019-07-28T00:00:00",
    "dateUpdated": "2024-08-05T00:19:41.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19129
Vulnerability from cvelistv5
Published
2018-11-09 11:00
Modified
2024-08-05 11:30
Severity ?
Summary
In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:30:03.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1138"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-09T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1138"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-19129",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1138",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1138"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-19129",
    "datePublished": "2018-11-09T11:00:00",
    "dateReserved": "2018-11-09T00:00:00",
    "dateUpdated": "2024-08-05T11:30:03.986Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2798
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.600Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2798",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2798",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9823
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
libavcodec/x86/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libavcodec/x86/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9823",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libavcodec/x86/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9823",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-5766
Vulnerability from cvelistv5
Published
2018-01-18 07:00
Modified
2024-08-05 05:40
Severity ?
Summary
In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T05:40:51.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1112"
          },
          {
            "name": "102793",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/102793"
          },
          {
            "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-02T10:06:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1112"
        },
        {
          "name": "102793",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/102793"
        },
        {
          "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-5766",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1112",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1112"
            },
            {
              "name": "102793",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/102793"
            },
            {
              "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-5766",
    "datePublished": "2018-01-18T07:00:00",
    "dateReserved": "2018-01-18T00:00:00",
    "dateUpdated": "2024-08-05T05:40:51.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-14371
Vulnerability from cvelistv5
Published
2019-07-28 18:44
Modified
2024-08-05 00:19
Severity ?
Summary
An issue was discovered in Libav 12.3. There is an infinite loop in the function mov_probe in the file libavformat/mov.c, related to offset and tag.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:39.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1163"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Libav 12.3. There is an infinite loop in the function mov_probe in the file libavformat/mov.c, related to offset and tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-28T18:44:03",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1163"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14371",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Libav 12.3. There is an infinite loop in the function mov_probe in the file libavformat/mov.c, related to offset and tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1163",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1163"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14371",
    "datePublished": "2019-07-28T18:44:03",
    "dateReserved": "2019-07-28T00:00:00",
    "dateUpdated": "2024-08-05T00:19:39.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18828
Vulnerability from cvelistv5
Published
2018-10-30 06:00
Modified
2024-08-05 11:23
Severity ?
Summary
There exists a heap-based buffer overflow in vc1_decode_i_block_adv in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There exists a heap-based buffer overflow in vc1_decode_i_block_adv in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-30T05:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18828",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There exists a heap-based buffer overflow in vc1_decode_i_block_adv in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1135",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18828",
    "datePublished": "2018-10-30T06:00:00",
    "dateReserved": "2018-10-29T00:00:00",
    "dateUpdated": "2024-08-05T11:23:08.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-9717
Vulnerability from cvelistv5
Published
2019-09-19 20:28
Modified
2024-08-04 22:01
Severity ?
Summary
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:01:53.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lgtm.com/security/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-19T20:28:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lgtm.com/security/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-9717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90",
              "refsource": "MISC",
              "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90"
            },
            {
              "name": "https://lgtm.com/security/",
              "refsource": "MISC",
              "url": "https://lgtm.com/security/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-9717",
    "datePublished": "2019-09-19T20:28:19",
    "dateReserved": "2019-03-12T00:00:00",
    "dateUpdated": "2024-08-04T22:01:53.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0853
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.815Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/trac/ffmpeg/ticket/780"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/trac/ffmpeg/ticket/780"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0853",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
            },
            {
              "name": "http://ffmpeg.org/trac/ffmpeg/ticket/780",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/trac/ffmpeg/ticket/780"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c509f4f74713b035a06f79cb4d00e708f5226bc5",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c509f4f74713b035a06f79cb4d00e708f5226bc5"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=c509f4f74713b035a06f79cb4d00e708f5226bc5",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=c509f4f74713b035a06f79cb4d00e708f5226bc5"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0853",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-18775
Vulnerability from cvelistv5
Published
2021-08-23 21:50
Modified
2024-08-04 14:08
Severity ?
Summary
In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T14:08:30.399Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1152"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cwe.mitre.org/data/definitions/126.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-10T20:16:44",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1152"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cwe.mitre.org/data/definitions/126.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-18775",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1152",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1152"
            },
            {
              "name": "https://cwe.mitre.org/data/definitions/126.html",
              "refsource": "MISC",
              "url": "https://cwe.mitre.org/data/definitions/126.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-18775",
    "datePublished": "2021-08-23T21:50:03",
    "dateReserved": "2020-08-13T00:00:00",
    "dateUpdated": "2024-08-04T14:08:30.399Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0947
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 18:45
Severity ?
Summary
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:45:25.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963"
          },
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "name": "DSA-2471",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "53389",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53389"
          },
          {
            "name": "[oss-security] 20120503 Security issue in libav/ffmpeg",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/03/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963"
        },
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "name": "DSA-2471",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "53389",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53389"
        },
        {
          "name": "[oss-security] 20120503 Security issue in libav/ffmpeg",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/03/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2012-0947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963",
              "refsource": "MISC",
              "url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963"
            },
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "DSA-2471",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2471"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "53389",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53389"
            },
            {
              "name": "[oss-security] 20120503 Security issue in libav/ffmpeg",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/03/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2012-0947",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2012-02-01T00:00:00",
    "dateUpdated": "2024-08-06T18:45:25.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-14442
Vulnerability from cvelistv5
Published
2019-07-30 12:05
Modified
2024-08-05 00:19
Severity ?
Summary
In mpc8_read_header in libavformat/mpc8.c in Libav 12.3, an input file can result in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could leverage this vulnerability to cause a denial of service via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:40.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1159"
          },
          {
            "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mpc8_read_header in libavformat/mpc8.c in Libav 12.3, an input file can result in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could leverage this vulnerability to cause a denial of service via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-05T13:06:31",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1159"
        },
        {
          "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14442",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mpc8_read_header in libavformat/mpc8.c in Libav 12.3, an input file can result in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could leverage this vulnerability to cause a denial of service via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1159",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1159"
            },
            {
              "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14442",
    "datePublished": "2019-07-30T12:05:38",
    "dateReserved": "2019-07-30T00:00:00",
    "dateUpdated": "2024-08-05T00:19:40.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19130
Vulnerability from cvelistv5
Published
2018-11-09 11:00
Modified
2024-08-05 11:30
Severity ?
Summary
In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:30:03.929Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1139"
          },
          {
            "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-05T20:06:10",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1139"
        },
        {
          "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-19130",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1139",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1139"
            },
            {
              "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-19130",
    "datePublished": "2018-11-09T11:00:00",
    "dateReserved": "2018-11-09T00:00:00",
    "dateUpdated": "2024-08-05T11:30:03.929Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9822
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.487Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "name": "DSA-3833",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3833"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "name": "DSA-3833",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3833"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9822",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "DSA-3833",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3833"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9822",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3945
Vulnerability from cvelistv5
Published
2012-08-20 20:00
Modified
2024-09-17 04:09
Severity ?
Summary
The decode_frame function in the KVG1 decoder (kgv1dec.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted media file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.414Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2012:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=807a045ab7f51993a2c1b3116016cbbd4f3d20d6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The decode_frame function in the KVG1 decoder (kgv1dec.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted media file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T20:00:00Z",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "MDVSA-2012:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=807a045ab7f51993a2c1b3116016cbbd4f3d20d6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3945",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decode_frame function in the KVG1 decoder (kgv1dec.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted media file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2012:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=807a045ab7f51993a2c1b3116016cbbd4f3d20d6",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=807a045ab7f51993a2c1b3116016cbbd4f3d20d6"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3945",
    "datePublished": "2012-08-20T20:00:00Z",
    "dateReserved": "2011-10-01T00:00:00Z",
    "dateUpdated": "2024-09-17T04:09:43.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-3395
Vulnerability from cvelistv5
Published
2015-06-16 16:00
Modified
2024-08-06 05:47
Severity ?
Summary
The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:47:57.389Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v11.4"
          },
          {
            "name": "GLSA-201705-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201705-08"
          },
          {
            "name": "USN-2944-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2944-1"
          },
          {
            "name": "DSA-3288",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3288"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f7e1367f58263593e6cee3c282f7277d7ee9d553"
          },
          {
            "name": "GLSA-201603-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201603-06"
          },
          {
            "name": "74433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74433"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ffmpeg.org/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v11.4"
        },
        {
          "name": "GLSA-201705-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201705-08"
        },
        {
          "name": "USN-2944-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2944-1"
        },
        {
          "name": "DSA-3288",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3288"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f7e1367f58263593e6cee3c282f7277d7ee9d553"
        },
        {
          "name": "GLSA-201603-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201603-06"
        },
        {
          "name": "74433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74433"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ffmpeg.org/security.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-3395",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4"
            },
            {
              "name": "GLSA-201705-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201705-08"
            },
            {
              "name": "USN-2944-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2944-1"
            },
            {
              "name": "DSA-3288",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3288"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f7e1367f58263593e6cee3c282f7277d7ee9d553",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f7e1367f58263593e6cee3c282f7277d7ee9d553"
            },
            {
              "name": "GLSA-201603-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201603-06"
            },
            {
              "name": "74433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74433"
            },
            {
              "name": "https://www.ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "https://www.ffmpeg.org/security.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3395",
    "datePublished": "2015-06-16T16:00:00",
    "dateReserved": "2015-04-21T00:00:00",
    "dateUpdated": "2024-08-06T05:47:57.389Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-7208
Vulnerability from cvelistv5
Published
2017-03-21 06:21
Modified
2024-08-05 15:56
Severity ?
Summary
The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
References
http://www.securityfocus.com/bid/97005vdb-entry, x_refsource_BID
https://bugzilla.libav.org/show_bug.cgi?id=1000x_refsource_CONFIRM
http://www.debian.org/security/2017/dsa-4012vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:56:35.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "97005",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97005"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1000"
          },
          {
            "name": "DSA-4012",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-4012"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "97005",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97005"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1000"
        },
        {
          "name": "DSA-4012",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-4012"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-7208",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "97005",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97005"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1000",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1000"
            },
            {
              "name": "DSA-4012",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-4012"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-7208",
    "datePublished": "2017-03-21T06:21:00",
    "dateReserved": "2017-03-21T00:00:00",
    "dateUpdated": "2024-08-05T15:56:35.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2784
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2777.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.436Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2777."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2784",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2777."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=25715064c2ef4978672a91f8c856f3e8809a7c45",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=25715064c2ef4978672a91f8c856f3e8809a7c45"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2784",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.436Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2793
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to "too many zeros."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to \"too many zeros.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2793",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to \"too many zeros.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=83c7803f55b3231faeb93c1a634399a70fae9480",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=83c7803f55b3231faeb93c1a634399a70fae9480"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2793",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17129
Vulnerability from cvelistv5
Published
2017-12-04 08:00
Modified
2024-08-05 20:43
Severity ?
Summary
The ff_vc1_mc_4mv_chroma4 function in libavcodec/vc1_mc.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) or possibly have unspecified other impact via a crafted file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:43:59.789Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1101"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_vc1_mc_4mv_chroma4 function in libavcodec/vc1_mc.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) or possibly have unspecified other impact via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-04T07:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1101"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17129",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_vc1_mc_4mv_chroma4 function in libavcodec/vc1_mc.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) or possibly have unspecified other impact via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1101",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1101"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17129",
    "datePublished": "2017-12-04T08:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:43:59.789Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2775
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an \"out of array write in quant_cof.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2775",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an \"out of array write in quant_cof.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=9d3032b960ae03066c008d6e6774f68b17a1d69d",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=9d3032b960ae03066c008d6e6774f68b17a1d69d"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2775",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9825
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
libswscale/utils.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.468Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libswscale/utils.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9825",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libswscale/utils.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9825",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-7206
Vulnerability from cvelistv5
Published
2017-03-21 06:21
Modified
2024-08-05 15:56
Severity ?
Summary
The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
References
http://www.securityfocus.com/bid/97006vdb-entry, x_refsource_BID
https://bugzilla.libav.org/show_bug.cgi?id=1002x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:56:36.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "97006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97006"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1002"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-23T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "97006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97006"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1002"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-7206",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "97006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97006"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1002",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1002"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-7206",
    "datePublished": "2017-03-21T06:21:00",
    "dateReserved": "2017-03-21T00:00:00",
    "dateUpdated": "2024-08-05T15:56:36.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9820
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.418Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9820",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9820",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.418Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-16803
Vulnerability from cvelistv5
Published
2017-11-13 17:00
Modified
2024-08-05 20:35
Severity ?
Summary
In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:35:21.014Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-4119",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4119"
          },
          {
            "name": "GLSA-201811-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201811-19"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1098"
          },
          {
            "name": "101882",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101882"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-11-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-27T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-4119",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4119"
        },
        {
          "name": "GLSA-201811-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201811-19"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1098"
        },
        {
          "name": "101882",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101882"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-16803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-4119",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4119"
            },
            {
              "name": "GLSA-201811-19",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201811-19"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1098",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1098"
            },
            {
              "name": "101882",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101882"
            },
            {
              "name": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f",
              "refsource": "CONFIRM",
              "url": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-16803",
    "datePublished": "2017-11-13T17:00:00",
    "dateReserved": "2017-11-13T00:00:00",
    "dateUpdated": "2024-08-05T20:35:21.014Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-8676
Vulnerability from cvelistv5
Published
2017-02-15 21:00
Modified
2024-08-06 02:27
Severity ?
Summary
The get_vlc2 function in get_bits.h in Libav 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file. NOTE: this issue exists due to an incomplete fix for CVE-2016-8675.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:27:41.217Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
          },
          {
            "name": "93468",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93468"
          },
          {
            "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
          },
          {
            "name": "[oss-security] 20161204 Re: libav: multiple crashes from the Undefined Behavior Sanitizer",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/12/04/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-10-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The get_vlc2 function in get_bits.h in Libav 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file.  NOTE: this issue exists due to an incomplete fix for CVE-2016-8675."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-16T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
        },
        {
          "name": "93468",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93468"
        },
        {
          "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
        },
        {
          "name": "[oss-security] 20161204 Re: libav: multiple crashes from the Undefined Behavior Sanitizer",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/12/04/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-8676",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The get_vlc2 function in get_bits.h in Libav 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file.  NOTE: this issue exists due to an incomplete fix for CVE-2016-8675."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
            },
            {
              "name": "93468",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93468"
            },
            {
              "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
            },
            {
              "name": "[oss-security] 20161204 Re: libav: multiple crashes from the Undefined Behavior Sanitizer",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/12/04/3"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-8676",
    "datePublished": "2017-02-15T21:00:00",
    "dateReserved": "2016-10-15T00:00:00",
    "dateUpdated": "2024-08-06T02:27:41.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2787
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "setup width/height."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"setup width/height.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2787",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"setup width/height.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2787",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0851
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.978Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/trac/ffmpeg/ticket/758"
          },
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
          },
          {
            "name": "DSA-2494",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2494"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=7fff64e00d886fde11d61958888c82b461cf99b9"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "ffmpeg-ffh264decode-code-exec(78933)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78933"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/trac/ffmpeg/ticket/758"
        },
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
        },
        {
          "name": "DSA-2494",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2494"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=7fff64e00d886fde11d61958888c82b461cf99b9"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "ffmpeg-ffh264decode-code-exec(78933)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78933"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0851",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://ffmpeg.org/trac/ffmpeg/ticket/758",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/trac/ffmpeg/ticket/758"
            },
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
            },
            {
              "name": "DSA-2494",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2494"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=7fff64e00d886fde11d61958888c82b461cf99b9",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=7fff64e00d886fde11d61958888c82b461cf99b9"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "ffmpeg-ffh264decode-code-exec(78933)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78933"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0851",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.978Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2804
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to "reallocation code" and the luma height and width.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.553Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4a80ebe491609e04110a1dd540a0ca79d3be3d04"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to \"reallocation code\" and the luma height and width."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4a80ebe491609e04110a1dd540a0ca79d3be3d04"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2804",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to \"reallocation code\" and the luma height and width."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=4a80ebe491609e04110a1dd540a0ca79d3be3d04",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=4a80ebe491609e04110a1dd540a0ca79d3be3d04"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2804",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.553Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2791
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the "transform size."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=0846719dd11ab3f7a7caee13e7af71f71d913389"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the \"transform size.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=0846719dd11ab3f7a7caee13e7af71f71d913389"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2791",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the \"transform size.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2791",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-8675
Vulnerability from cvelistv5
Published
2017-02-15 21:00
Modified
2024-08-06 02:27
Severity ?
Summary
The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:27:41.274Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
          },
          {
            "name": "93468",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93468"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860"
          },
          {
            "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-10-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
        },
        {
          "name": "93468",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93468"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860"
        },
        {
          "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-8675",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
            },
            {
              "name": "93468",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93468"
            },
            {
              "name": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860",
              "refsource": "CONFIRM",
              "url": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860"
            },
            {
              "name": "[oss-security] 20161015 Re: libav: null pointer dereference in get_vlc2 (get_bits.h)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-8675",
    "datePublished": "2017-02-15T21:00:00",
    "dateReserved": "2016-10-15T00:00:00",
    "dateUpdated": "2024-08-06T02:27:41.274Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3947
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 23:53
Severity ?
Summary
Buffer overflow in mjpegbdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MJPEG-B file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.316Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "name": "DSA-2471",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mjpegbdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MJPEG-B file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "name": "DSA-2471",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mjpegbdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MJPEG-B file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=b57d262412204e54a7ef8fa1b23ff4dcede622e5",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=b57d262412204e54a7ef8fa1b23ff4dcede622e5",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "DSA-2471",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2471"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3947",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.316Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-18778
Vulnerability from cvelistv5
Published
2021-08-23 21:50
Modified
2024-08-04 14:08
Severity ?
Summary
In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T14:08:30.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1155"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cwe.mitre.org/data/definitions/126.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-10T20:16:46",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1155"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cwe.mitre.org/data/definitions/126.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-18778",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1155",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1155"
            },
            {
              "name": "https://cwe.mitre.org/data/definitions/126.html",
              "refsource": "MISC",
              "url": "https://cwe.mitre.org/data/definitions/126.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-18778",
    "datePublished": "2021-08-23T21:50:04",
    "dateReserved": "2020-08-13T00:00:00",
    "dateUpdated": "2024-08-04T14:08:30.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-6832
Vulnerability from cvelistv5
Published
2017-02-15 19:00
Modified
2024-08-06 01:43
Severity ?
Summary
Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:43:37.927Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/"
          },
          {
            "name": "[oss-security] 20160817 Re: libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/08/18/1"
          },
          {
            "name": "[oss-security] 20160813 libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/08/13/1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=0ac8ff618c5e6d878c547a8877e714ed728950ce"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=825"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-15T17:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/"
        },
        {
          "name": "[oss-security] 20160817 Re: libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/08/18/1"
        },
        {
          "name": "[oss-security] 20160813 libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/08/13/1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=0ac8ff618c5e6d878c547a8877e714ed728950ce"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=825"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-6832",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/"
            },
            {
              "name": "[oss-security] 20160817 Re: libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/08/18/1"
            },
            {
              "name": "[oss-security] 20160813 libav: heap-based buffer overflow in ff_audio_resample (resample.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/08/13/1"
            },
            {
              "name": "https://git.libav.org/?p=libav.git;a=commit;h=0ac8ff618c5e6d878c547a8877e714ed728950ce",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=commit;h=0ac8ff618c5e6d878c547a8877e714ed728950ce"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=825",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=825"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-6832",
    "datePublished": "2017-02-15T19:00:00",
    "dateReserved": "2016-08-17T00:00:00",
    "dateUpdated": "2024-08-06T01:43:37.927Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0858
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-09-17 00:31
Severity ?
Summary
The Shorten codec (shorten.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Shorten file, related to an "invalid free".
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Shorten codec (shorten.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Shorten file, related to an \"invalid free\"."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T18:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0858",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Shorten codec (shorten.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Shorten file, related to an \"invalid free\"."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=204cb29b3c84a74cbcd059d353c70c8bdc567d98",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commitdiff;h=204cb29b3c84a74cbcd059d353c70c8bdc567d98",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commitdiff;h=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0858",
    "datePublished": "2012-08-20T18:00:00Z",
    "dateReserved": "2012-01-19T00:00:00Z",
    "dateUpdated": "2024-09-17T00:31:25.399Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-5984
Vulnerability from cvelistv5
Published
2019-05-22 19:26
Modified
2024-08-05 15:18
Severity ?
Summary
In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:18:49.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1019"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://patches.libav.org/patch/62534/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-22T19:26:28",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1019"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://patches.libav.org/patch/62534/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5984",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1019",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1019"
            },
            {
              "name": "https://patches.libav.org/patch/62534/",
              "refsource": "MISC",
              "url": "https://patches.libav.org/patch/62534/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5984",
    "datePublished": "2019-05-22T19:26:28",
    "dateReserved": "2017-02-13T00:00:00",
    "dateUpdated": "2024-08-05T15:18:49.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-14441
Vulnerability from cvelistv5
Published
2019-07-30 12:05
Modified
2024-08-05 00:19
Severity ?
Summary
An issue was discovered in Libav 12.3. An access violation allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv. This is related to ff_mpa_synth_filter_float in avcodec/mpegaudiodsp_template.c. NOTE: This may be a duplicate of CVE-2018-19129
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:40.967Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Libav 12.3. An access violation allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv. This is related to ff_mpa_synth_filter_float in avcodec/mpegaudiodsp_template.c. NOTE: This may be a duplicate of CVE-2018-19129"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-22T15:07:24",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14441",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** An issue was discovered in Libav 12.3. An access violation allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv. This is related to ff_mpa_synth_filter_float in avcodec/mpegaudiodsp_template.c. NOTE: This may be a duplicate of CVE-2018-19129."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14441",
    "datePublished": "2019-07-30T12:05:30",
    "dateReserved": "2019-07-30T00:00:00",
    "dateUpdated": "2024-08-05T00:19:40.967Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2777
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2784.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.498Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2784."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2777",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2784."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=25715064c2ef4978672a91f8c856f3e8809a7c45",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=25715064c2ef4978672a91f8c856f3e8809a7c45"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2777",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.498Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3940
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 23:53
Severity ?
Summary
nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers "use of uninitialized streams."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c898431ca5ef2a997fe9388b650f658fb60783e5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a"
          },
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "name": "DSA-2471",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers \"use of uninitialized streams.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c898431ca5ef2a997fe9388b650f658fb60783e5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a"
        },
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "name": "DSA-2471",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3940",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers \"use of uninitialized streams.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c898431ca5ef2a997fe9388b650f658fb60783e5",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c898431ca5ef2a997fe9388b650f658fb60783e5"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a"
            },
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "DSA-2471",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2471"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3940",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.261Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18242
Vulnerability from cvelistv5
Published
2018-03-22 21:00
Modified
2024-09-17 02:16
Severity ?
Summary
The apply_dependent_coupling function in libavcodec/aacdec.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.232Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1093"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The apply_dependent_coupling function in libavcodec/aacdec.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-22T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1093"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18242",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The apply_dependent_coupling function in libavcodec/aacdec.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1093",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1093"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18242",
    "datePublished": "2018-03-22T21:00:00Z",
    "dateReserved": "2018-03-22T00:00:00Z",
    "dateUpdated": "2024-09-17T02:16:46.715Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2794
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "allocated tile size ... mismatches parameters."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.502Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"allocated tile size ... mismatches parameters.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2794",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"allocated tile size ... mismatches parameters.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5ad7335ebac2b38bb2a1c8df51a500b78461c05a",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5ad7335ebac2b38bb2a1c8df51a500b78461c05a"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2794",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.502Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-5271
Vulnerability from cvelistv5
Published
2014-11-03 16:00
Modified
2024-08-06 11:41
Severity ?
Summary
Heap-based buffer overflow in the encode_slice function in libavcodec/proresenc_kostya.c in FFMpeg before 1.1.14, 1.2.x before 1.2.8, 2.x before 2.2.7, and 2.3.x before 2.3.3 and Libav before 10.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:41:47.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "111725",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/111725"
          },
          {
            "name": "69250",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/69250"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=52b81ff4635c077b2bc8b8d3637d933b6629d803"
          },
          {
            "name": "GLSA-201603-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201603-06"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ffmpeg.org/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the encode_slice function in libavcodec/proresenc_kostya.c in FFMpeg before 1.1.14, 1.2.x before 1.2.8, 2.x before 2.2.7, and 2.3.x before 2.3.3 and Libav before 10.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-01T15:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "111725",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/111725"
        },
        {
          "name": "69250",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/69250"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=52b81ff4635c077b2bc8b8d3637d933b6629d803"
        },
        {
          "name": "GLSA-201603-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201603-06"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ffmpeg.org/security.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-5271",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the encode_slice function in libavcodec/proresenc_kostya.c in FFMpeg before 1.1.14, 1.2.x before 1.2.8, 2.x before 2.2.7, and 2.3.x before 2.3.3 and Libav before 10.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "111725",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/111725"
            },
            {
              "name": "69250",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/69250"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=52b81ff4635c077b2bc8b8d3637d933b6629d803",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=52b81ff4635c077b2bc8b8d3637d933b6629d803"
            },
            {
              "name": "GLSA-201603-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201603-06"
            },
            {
              "name": "https://www.ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "https://www.ffmpeg.org/security.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-5271",
    "datePublished": "2014-11-03T16:00:00",
    "dateReserved": "2014-08-15T00:00:00",
    "dateUpdated": "2024-08-06T11:41:47.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17128
Vulnerability from cvelistv5
Published
2017-12-04 08:00
Modified
2024-08-05 20:43
Severity ?
Summary
The h264_slice_init function in libavcodec/h264_slice.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:43:59.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1104"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The h264_slice_init function in libavcodec/h264_slice.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-04T07:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1104"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The h264_slice_init function in libavcodec/h264_slice.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1104",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1104"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17128",
    "datePublished": "2017-12-04T08:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:43:59.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4352
Vulnerability from cvelistv5
Published
2012-08-20 20:00
Modified
2024-09-17 01:01
Severity ?
Summary
Integer overflow in the vp3_dequant function in the VP3 decoder (vp3.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VP3 stream, which triggers a buffer overflow.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.692Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.6.4.changelog"
          },
          {
            "name": "MDVSA-2012:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
          },
          {
            "name": "USN-1320-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1320-1"
          },
          {
            "name": "MDVSA-2012:074",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
          },
          {
            "name": "MDVSA-2012:075",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f"
          },
          {
            "name": "20111123 NGS00145 Patch Notification: FFmpeg Libavcodec out of bounds write remote code execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/520622"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "USN-1333-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1333-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.5.6.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.3.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the vp3_dequant function in the VP3 decoder (vp3.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VP3 stream, which triggers a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.6.4.changelog"
        },
        {
          "name": "MDVSA-2012:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
        },
        {
          "name": "USN-1320-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1320-1"
        },
        {
          "name": "MDVSA-2012:074",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
        },
        {
          "name": "MDVSA-2012:075",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f"
        },
        {
          "name": "20111123 NGS00145 Patch Notification: FFmpeg Libavcodec out of bounds write remote code execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/520622"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "USN-1333-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1333-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.5.6.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.3.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the vp3_dequant function in the VP3 decoder (vp3.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VP3 stream, which triggers a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://libav.org/releases/libav-0.6.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.6.4.changelog"
            },
            {
              "name": "MDVSA-2012:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
            },
            {
              "name": "USN-1320-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1320-1"
            },
            {
              "name": "MDVSA-2012:074",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
            },
            {
              "name": "MDVSA-2012:075",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=8b94df0f2047e9728cb872adc9e64557b7a5152f",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=8b94df0f2047e9728cb872adc9e64557b7a5152f"
            },
            {
              "name": "20111123 NGS00145 Patch Notification: FFmpeg Libavcodec out of bounds write remote code execution",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/520622"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "USN-1333-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1333-1"
            },
            {
              "name": "http://libav.org/releases/libav-0.5.6.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.5.6.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.3.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.3.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=eef5c35b4352ec49ca41f6198bee8a976b1f81e5",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=eef5c35b4352ec49ca41f6198bee8a976b1f81e5"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4352",
    "datePublished": "2012-08-20T20:00:00Z",
    "dateReserved": "2011-11-04T00:00:00Z",
    "dateUpdated": "2024-09-17T01:01:06.937Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-11684
Vulnerability from cvelistv5
Published
2017-07-27 06:00
Modified
2024-08-05 18:19
Severity ?
Summary
There is an illegal address access in the build_table function in libavcodec/bitstream.c of Libav 12.1 that will lead to remote denial of service via crafted input.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:19:37.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "99980",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99980"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1073"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-07-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an illegal address access in the build_table function in libavcodec/bitstream.c of Libav 12.1 that will lead to remote denial of service via crafted input."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "99980",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99980"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1073"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11684",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an illegal address access in the build_table function in libavcodec/bitstream.c of Libav 12.1 that will lead to remote denial of service via crafted input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "99980",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99980"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1073",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1073"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-11684",
    "datePublished": "2017-07-27T06:00:00",
    "dateReserved": "2017-07-26T00:00:00",
    "dateUpdated": "2024-08-05T18:19:37.718Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3362
Vulnerability from cvelistv5
Published
2011-10-02 20:00
Modified
2024-09-16 22:36
Severity ?
Summary
Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:29:56.935Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "45532",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45532"
          },
          {
            "name": "[oss-security] 20110913 CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/09/13/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=91d5da9321c52e8197fb14046ebb335f3e6ff4a0"
          },
          {
            "name": "[oss-security] 20110914 Re: CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/09/14/8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ocert.org/advisories/ocert-2011-002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c5cbda50793e311aa73489d12184ffd6761c9fbf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-10-02T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "45532",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45532"
        },
        {
          "name": "[oss-security] 20110913 CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/09/13/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=91d5da9321c52e8197fb14046ebb335f3e6ff4a0"
        },
        {
          "name": "[oss-security] 20110914 Re: CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/09/14/8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ocert.org/advisories/ocert-2011-002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c5cbda50793e311aa73489d12184ffd6761c9fbf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-3362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "45532",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45532"
            },
            {
              "name": "[oss-security] 20110913 CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/09/13/4"
            },
            {
              "name": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
            },
            {
              "name": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=91d5da9321c52e8197fb14046ebb335f3e6ff4a0",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=91d5da9321c52e8197fb14046ebb335f3e6ff4a0"
            },
            {
              "name": "[oss-security] 20110914 Re: CVE request: ffmpeg/libav insufficuent boundary check in CAVS decoding",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/09/14/8"
            },
            {
              "name": "http://www.ocert.org/advisories/ocert-2011-002.html",
              "refsource": "MISC",
              "url": "http://www.ocert.org/advisories/ocert-2011-002.html"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c5cbda50793e311aa73489d12184ffd6761c9fbf",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c5cbda50793e311aa73489d12184ffd6761c9fbf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-3362",
    "datePublished": "2011-10-02T20:00:00Z",
    "dateReserved": "2011-08-30T00:00:00Z",
    "dateUpdated": "2024-09-16T22:36:18.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-18776
Vulnerability from cvelistv5
Published
2021-08-23 21:50
Modified
2024-08-04 14:08
Severity ?
Summary
In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T14:08:30.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1153"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-23T21:50:04",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1153"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-18776",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1153",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1153"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-18776",
    "datePublished": "2021-08-23T21:50:04",
    "dateReserved": "2020-08-13T00:00:00",
    "dateUpdated": "2024-08-04T14:08:30.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-4609
Vulnerability from cvelistv5
Published
2020-01-14 15:41
Modified
2024-08-06 11:20
Severity ?
Summary
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:20:26.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/06/26/22"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://libav.org/news/#2014-06-27"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-14T15:41:33",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/06/26/22"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://libav.org/news/#2014-06-27"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-4609",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html",
              "refsource": "MISC",
              "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
            },
            {
              "name": "http://www.openwall.com/lists/oss-security/2014/06/26/22",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2014/06/26/22"
            },
            {
              "name": "https://libav.org/news/#2014-06-27",
              "refsource": "MISC",
              "url": "https://libav.org/news/#2014-06-27"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-4609",
    "datePublished": "2020-01-14T15:41:33",
    "dateReserved": "2014-06-23T00:00:00",
    "dateUpdated": "2024-08-06T11:20:26.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3984
Vulnerability from cvelistv5
Published
2014-06-06 14:00
Modified
2024-08-06 11:04
Severity ?
Summary
Multiple unspecified vulnerabilities in Libav before 0.8.12 allow remote attackers to have unknown impact and vectors.
References
http://secunia.com/advisories/59032third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2244-1vendor-advisory, x_refsource_UBUNTU
http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12x_refsource_CONFIRM
http://secunia.com/advisories/59045third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2947vendor-advisory, x_refsource_DEBIAN
http://libav.org/news.htmlx_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:04:26.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "59032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59032"
          },
          {
            "name": "USN-2244-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2244-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12"
          },
          {
            "name": "59045",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59045"
          },
          {
            "name": "DSA-2947",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2947"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/news.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Libav before 0.8.12 allow remote attackers to have unknown impact and vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "59032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59032"
        },
        {
          "name": "USN-2244-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2244-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12"
        },
        {
          "name": "59045",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59045"
        },
        {
          "name": "DSA-2947",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2947"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/news.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3984",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Libav before 0.8.12 allow remote attackers to have unknown impact and vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "59032",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59032"
            },
            {
              "name": "USN-2244-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2244-1"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.12",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.12"
            },
            {
              "name": "59045",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59045"
            },
            {
              "name": "DSA-2947",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2947"
            },
            {
              "name": "http://libav.org/news.html",
              "refsource": "CONFIRM",
              "url": "http://libav.org/news.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3984",
    "datePublished": "2014-06-06T14:00:00",
    "dateReserved": "2014-06-06T00:00:00",
    "dateUpdated": "2024-08-06T11:04:26.954Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4364
Vulnerability from cvelistv5
Published
2012-08-20 20:00
Modified
2024-09-16 23:45
Severity ?
Summary
Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:09:18.348Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.6.4.changelog"
          },
          {
            "name": "MDVSA-2012:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
          },
          {
            "name": "USN-1320-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1320-1"
          },
          {
            "name": "MDVSA-2012:074",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
          },
          {
            "name": "MDVSA-2012:075",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "USN-1333-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1333-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.5.6.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.3.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.6.4.changelog"
        },
        {
          "name": "MDVSA-2012:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
        },
        {
          "name": "USN-1320-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1320-1"
        },
        {
          "name": "MDVSA-2012:074",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
        },
        {
          "name": "MDVSA-2012:075",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "USN-1333-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1333-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.5.6.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.3.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
            },
            {
              "name": "http://libav.org/releases/libav-0.6.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.6.4.changelog"
            },
            {
              "name": "MDVSA-2012:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
            },
            {
              "name": "USN-1320-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1320-1"
            },
            {
              "name": "MDVSA-2012:074",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
            },
            {
              "name": "MDVSA-2012:075",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "USN-1333-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1333-1"
            },
            {
              "name": "http://libav.org/releases/libav-0.5.6.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.5.6.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.3.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.3.changelog"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4364",
    "datePublished": "2012-08-20T20:00:00Z",
    "dateReserved": "2011-11-04T00:00:00Z",
    "dateUpdated": "2024-09-16T23:45:39.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-1000460
Vulnerability from cvelistv5
Published
2018-01-03 20:00
Modified
2024-08-05 22:00
Severity ?
Summary
In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(&gb) is called on an uninitialized get_bits context, which causes a NULL deref exception.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:00:41.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=952"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c"
          },
          {
            "name": "[debian-lts-announce] 20190330 [SECURITY] [DLA 1740-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "dateAssigned": "2017-12-29T00:00:00",
      "datePublic": "2018-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(\u0026gb) is called on an uninitialized get_bits context, which causes a NULL deref exception."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-31T01:06:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=952"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c"
        },
        {
          "name": "[debian-lts-announce] 20190330 [SECURITY] [DLA 1740-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "DATE_ASSIGNED": "2017-12-29",
          "ID": "CVE-2017-1000460",
          "REQUESTER": "jan.ruge@mailbox.org",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(\u0026gb) is called on an uninitialized get_bits context, which causes a NULL deref exception."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html",
              "refsource": "MISC",
              "url": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=952",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=952"
            },
            {
              "name": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c",
              "refsource": "MISC",
              "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c"
            },
            {
              "name": "[debian-lts-announce] 20190330 [SECURITY] [DLA 1740-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-1000460",
    "datePublished": "2018-01-03T20:00:00",
    "dateReserved": "2018-01-03T00:00:00",
    "dateUpdated": "2024-08-05T22:00:41.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-7477
Vulnerability from cvelistv5
Published
2017-02-15 21:00
Modified
2024-08-06 01:57
Severity ?
Summary
The ff_put_pixels8_xy2_mmx function in rnd_template.c in Libav 11.7 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted mp3 file. NOTE: this issue was originally reported as involving a NULL pointer dereference.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.680Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/"
          },
          {
            "name": "93042",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93042"
          },
          {
            "name": "[oss-security] 20160921 Re: libav: NULL pointer dereference in ff_put_pixels8_xy2_mmx (rnd_template.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/21/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-09-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_put_pixels8_xy2_mmx function in rnd_template.c in Libav 11.7 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted mp3 file.  NOTE: this issue was originally reported as involving a NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/"
        },
        {
          "name": "93042",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93042"
        },
        {
          "name": "[oss-security] 20160921 Re: libav: NULL pointer dereference in ff_put_pixels8_xy2_mmx (rnd_template.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/21/6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7477",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_put_pixels8_xy2_mmx function in rnd_template.c in Libav 11.7 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted mp3 file.  NOTE: this issue was originally reported as involving a NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/"
            },
            {
              "name": "93042",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93042"
            },
            {
              "name": "[oss-security] 20160921 Re: libav: NULL pointer dereference in ff_put_pixels8_xy2_mmx (rnd_template.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/21/6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7477",
    "datePublished": "2017-02-15T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.680Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4353
Vulnerability from cvelistv5
Published
2012-08-20 20:00
Modified
2024-09-16 19:35
Severity ?
Summary
The (1) av_image_fill_pointers, (2) vp5_parse_coeff, and (3) vp6_parse_coeff functions in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted VP5 or VP6 stream.
References
http://libav.org/releases/libav-0.6.4.changelogx_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2012:076vendor-advisory, x_refsource_MANDRIVA
http://ubuntu.com/usn/usn-1320-1vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2012:074vendor-advisory, x_refsource_MANDRIVA
http://www.mandriva.com/security/advisories?name=MDVSA-2012:075vendor-advisory, x_refsource_MANDRIVA
http://ffmpeg.org/x_refsource_CONFIRM
http://libav.org/x_refsource_CONFIRM
http://ubuntu.com/usn/usn-1333-1vendor-advisory, x_refsource_UBUNTU
http://libav.org/releases/libav-0.5.6.changelogx_refsource_CONFIRM
http://libav.org/releases/libav-0.7.3.changelogx_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.6.4.changelog"
          },
          {
            "name": "MDVSA-2012:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
          },
          {
            "name": "USN-1320-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1320-1"
          },
          {
            "name": "MDVSA-2012:074",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
          },
          {
            "name": "MDVSA-2012:075",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "USN-1333-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1333-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.5.6.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.3.changelog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) av_image_fill_pointers, (2) vp5_parse_coeff, and (3) vp6_parse_coeff functions in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted VP5 or VP6 stream."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.6.4.changelog"
        },
        {
          "name": "MDVSA-2012:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
        },
        {
          "name": "USN-1320-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1320-1"
        },
        {
          "name": "MDVSA-2012:074",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
        },
        {
          "name": "MDVSA-2012:075",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "USN-1333-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1333-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.5.6.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.3.changelog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4353",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) av_image_fill_pointers, (2) vp5_parse_coeff, and (3) vp6_parse_coeff functions in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted VP5 or VP6 stream."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://libav.org/releases/libav-0.6.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.6.4.changelog"
            },
            {
              "name": "MDVSA-2012:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
            },
            {
              "name": "USN-1320-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1320-1"
            },
            {
              "name": "MDVSA-2012:074",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
            },
            {
              "name": "MDVSA-2012:075",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "USN-1333-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1333-1"
            },
            {
              "name": "http://libav.org/releases/libav-0.5.6.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.5.6.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.3.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.3.changelog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4353",
    "datePublished": "2012-08-20T20:00:00Z",
    "dateReserved": "2011-11-04T00:00:00Z",
    "dateUpdated": "2024-09-16T19:35:31.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3951
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-09-17 04:20
Severity ?
Summary
The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media file.
References
http://www.ubuntu.com/usn/USN-1479-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2012/dsa-2494vendor-advisory, x_refsource_DEBIAN
http://ffmpeg.org/x_refsource_CONFIRM
http://libav.org/x_refsource_CONFIRM
http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=ce7aee9b733134649a6ce2fa743e51733f33e67ex_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.287Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "DSA-2494",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2494"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=ce7aee9b733134649a6ce2fa743e51733f33e67e"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T18:00:00Z",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "DSA-2494",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2494"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=ce7aee9b733134649a6ce2fa743e51733f33e67e"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3951",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "DSA-2494",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2494"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3951",
    "datePublished": "2012-08-20T18:00:00Z",
    "dateReserved": "2011-10-01T00:00:00Z",
    "dateUpdated": "2024-09-17T04:20:11.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0852
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an ADPCM file with the number of channels not equal to two.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.805Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://ffmpeg.org/trac/ffmpeg/ticket/794"
          },
          {
            "name": "DSA-2494",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2494"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=608708009f69ba4cecebf05120c696167494c897"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "ffmpeg-adpcmdecodeframe-code-exec(78932)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78932"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an ADPCM file with the number of channels not equal to two."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://ffmpeg.org/trac/ffmpeg/ticket/794"
        },
        {
          "name": "DSA-2494",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2494"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=608708009f69ba4cecebf05120c696167494c897"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "ffmpeg-adpcmdecodeframe-code-exec(78932)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78932"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0852",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an ADPCM file with the number of channels not equal to two."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
            },
            {
              "name": "https://ffmpeg.org/trac/ffmpeg/ticket/794",
              "refsource": "CONFIRM",
              "url": "https://ffmpeg.org/trac/ffmpeg/ticket/794"
            },
            {
              "name": "DSA-2494",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2494"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=608708009f69ba4cecebf05120c696167494c897",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=608708009f69ba4cecebf05120c696167494c897"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "ffmpeg-adpcmdecodeframe-code-exec(78932)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78932"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0852",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.805Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-3062
Vulnerability from cvelistv5
Published
2016-06-16 18:00
Modified
2024-08-05 23:40
Severity ?
Summary
The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:40:15.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1685",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
          },
          {
            "name": "GLSA-201705-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201705-08"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328"
          },
          {
            "name": "DSA-3603",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3603"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=929"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://libav.org/releases/libav-11.7.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://ffmpeg.org/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1685",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
        },
        {
          "name": "GLSA-201705-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201705-08"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328"
        },
        {
          "name": "DSA-3603",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3603"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=929"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://libav.org/releases/libav-11.7.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://ffmpeg.org/security.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-3062",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1685",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
            },
            {
              "name": "GLSA-201705-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201705-08"
            },
            {
              "name": "https://git.libav.org/?p=libav.git;a=commit;h=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=commit;h=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328"
            },
            {
              "name": "DSA-3603",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3603"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=929",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=929"
            },
            {
              "name": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746",
              "refsource": "CONFIRM",
              "url": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746"
            },
            {
              "name": "https://libav.org/releases/libav-11.7.changelog",
              "refsource": "CONFIRM",
              "url": "https://libav.org/releases/libav-11.7.changelog"
            },
            {
              "name": "https://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "https://ffmpeg.org/security.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-3062",
    "datePublished": "2016-06-16T18:00:00",
    "dateReserved": "2016-03-09T00:00:00",
    "dateUpdated": "2024-08-05T23:40:15.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-14443
Vulnerability from cvelistv5
Published
2019-07-30 12:05
Modified
2024-08-05 00:19
Severity ?
Summary
An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:40.659Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1"
          },
          {
            "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-05T20:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1"
        },
        {
          "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14443",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1"
            },
            {
              "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14443",
    "datePublished": "2019-07-30T12:05:49",
    "dateReserved": "2019-07-30T00:00:00",
    "dateUpdated": "2024-08-05T00:19:40.659Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18829
Vulnerability from cvelistv5
Published
2018-10-30 06:00
Modified
2024-08-05 11:23
Severity ?
Summary
There exists a NULL pointer dereference in ff_vc1_parse_frame_header_adv in vc1.c in Libav 12.3, which allows attackers to cause a denial-of-service through a crafted aac file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.154Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1136"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There exists a NULL pointer dereference in ff_vc1_parse_frame_header_adv in vc1.c in Libav 12.3, which allows attackers to cause a denial-of-service through a crafted aac file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-30T05:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1136"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18829",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There exists a NULL pointer dereference in ff_vc1_parse_frame_header_adv in vc1.c in Libav 12.3, which allows attackers to cause a denial-of-service through a crafted aac file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1136",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1136"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18829",
    "datePublished": "2018-10-30T06:00:00",
    "dateReserved": "2018-10-29T00:00:00",
    "dateUpdated": "2024-08-05T11:23:08.154Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18827
Vulnerability from cvelistv5
Published
2018-10-30 06:00
Modified
2024-08-05 11:23
Severity ?
Summary
There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.254Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-30T05:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18827",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1135",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18827",
    "datePublished": "2018-10-30T06:00:00",
    "dateReserved": "2018-10-29T00:00:00",
    "dateUpdated": "2024-08-05T11:23:08.254Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2788
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array read" when a "packet is shrunk."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array read\" when a \"packet is shrunk.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2788",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array read\" when a \"packet is shrunk.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c41ac870470c614185e1752c11f892809022248a",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=c41ac870470c614185e1752c11f892809022248a"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2788",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3952
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-09-16 16:53
Severity ?
Summary
The decode_init function in kmvc.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large palette size in a KMVC encoded file.
References
http://www.ubuntu.com/usn/USN-1479-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2012/dsa-2494vendor-advisory, x_refsource_DEBIAN
http://ffmpeg.org/x_refsource_CONFIRM
http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=386741f887714d3e46c9e8fe577e326a7964037bx_refsource_CONFIRM
http://libav.org/x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.486Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "DSA-2494",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2494"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=386741f887714d3e46c9e8fe577e326a7964037b"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The decode_init function in kmvc.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large palette size in a KMVC encoded file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T18:00:00Z",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "DSA-2494",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2494"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=386741f887714d3e46c9e8fe577e326a7964037b"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3952",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decode_init function in kmvc.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large palette size in a KMVC encoded file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "DSA-2494",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2494"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=386741f887714d3e46c9e8fe577e326a7964037b",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=386741f887714d3e46c9e8fe577e326a7964037b"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3952",
    "datePublished": "2012-08-20T18:00:00Z",
    "dateReserved": "2011-10-01T00:00:00Z",
    "dateUpdated": "2024-09-16T16:53:20.903Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18826
Vulnerability from cvelistv5
Published
2018-10-30 06:00
Modified
2024-08-05 11:23
Severity ?
Summary
There exists a heap-based buffer overflow in vc1_decode_p_mb_intfi in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There exists a heap-based buffer overflow in vc1_decode_p_mb_intfi in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-30T05:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18826",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There exists a heap-based buffer overflow in vc1_decode_p_mb_intfi in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1135",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18826",
    "datePublished": "2018-10-30T06:00:00",
    "dateReserved": "2018-10-29T00:00:00",
    "dateUpdated": "2024-08-05T11:23:08.208Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2786
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2786",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d1c95d2ce39560e251fdb14f4af91b04fd7b845c",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d1c95d2ce39560e251fdb14f4af91b04fd7b845c"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2786",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19128
Vulnerability from cvelistv5
Published
2018-11-09 11:00
Modified
2024-08-05 11:30
Severity ?
Summary
In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:30:04.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1137"
          },
          {
            "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-05T20:06:10",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1137"
        },
        {
          "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-19128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1137",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1137"
            },
            {
              "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-19128",
    "datePublished": "2018-11-09T11:00:00",
    "dateReserved": "2018-11-09T00:00:00",
    "dateUpdated": "2024-08-05T11:30:04.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-9719
Vulnerability from cvelistv5
Published
2019-09-19 20:32
Modified
2024-08-04 22:01
Severity ?
Summary
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because “no evidence of a vulnerability is provided” and only “a generic warning from a static code analysis” is provided
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:01:53.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lgtm.com/security/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because \u201cno evidence of a vulnerability is provided\u201d and only \u201ca generic warning from a static code analysis\u201d is provided"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-18T17:32:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lgtm.com/security/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-9719",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because \u201cno evidence of a vulnerability is provided\u201d and only \u201ca generic warning from a static code analysis\u201d is provided."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113",
              "refsource": "MISC",
              "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113"
            },
            {
              "name": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c",
              "refsource": "MISC",
              "url": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c"
            },
            {
              "name": "https://lgtm.com/security/",
              "refsource": "MISC",
              "url": "https://lgtm.com/security/"
            },
            {
              "name": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1",
              "refsource": "MISC",
              "url": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-9719",
    "datePublished": "2019-09-19T20:32:34",
    "dateReserved": "2019-03-12T00:00:00",
    "dateUpdated": "2024-08-04T22:01:53.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2772
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing with frame threading."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.370Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing with frame threading.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2772",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing with frame threading.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2772",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18246
Vulnerability from cvelistv5
Published
2018-03-23 19:00
Modified
2024-09-17 01:56
Severity ?
Summary
The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.224Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1095"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-23T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1095"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18246",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1095",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1095"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18246",
    "datePublished": "2018-03-23T19:00:00Z",
    "dateReserved": "2018-03-23T00:00:00Z",
    "dateUpdated": "2024-09-17T01:56:34.385Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3929
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 23:53
Severity ?
Summary
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=5a396bb3a66a61a68b80f2369d0249729bf85e04"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "name": "DSA-2471",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=5a396bb3a66a61a68b80f2369d0249729bf85e04"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "name": "DSA-2471",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3929",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "DSA-2471",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2471"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3929",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-7499
Vulnerability from cvelistv5
Published
2017-02-15 21:00
Modified
2024-08-06 01:57
Severity ?
Summary
The sbr_make_f_master function in aacsbr.c in Libav 11.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "93102",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93102"
          },
          {
            "name": "[oss-security] 20160921 Re: libav: divide-by-zero in sbr_make_f_master (aacsbr.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=blobdiff%3Bf=libavcodec/aacsbr.c%3Bh=7d156e525b40b197c38db17acf16730845b91e56%3Bhp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e%3Bhb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52%3Bhpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-09-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sbr_make_f_master function in aacsbr.c in Libav 11.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "93102",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93102"
        },
        {
          "name": "[oss-security] 20160921 Re: libav: divide-by-zero in sbr_make_f_master (aacsbr.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=blobdiff%3Bf=libavcodec/aacsbr.c%3Bh=7d156e525b40b197c38db17acf16730845b91e56%3Bhp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e%3Bhb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52%3Bhpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7499",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sbr_make_f_master function in aacsbr.c in Libav 11.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "93102",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93102"
            },
            {
              "name": "[oss-security] 20160921 Re: libav: divide-by-zero in sbr_make_f_master (aacsbr.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
            },
            {
              "name": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7499",
    "datePublished": "2017-02-15T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-5144
Vulnerability from cvelistv5
Published
2012-12-12 11:00
Modified
2024-08-06 20:58
Severity ?
Summary
Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:02.668Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "name": "oval:org.mitre.oval:def:16007",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=161639"
          },
          {
            "name": "openSUSE-SU-2012:1682",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to \"an off-by-one overwrite when switching to LTP profile from MAIN.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "name": "oval:org.mitre.oval:def:16007",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=161639"
        },
        {
          "name": "openSUSE-SU-2012:1682",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-5144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to \"an off-by-one overwrite when switching to LTP profile from MAIN.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "oval:org.mitre.oval:def:16007",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=161639",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=161639"
            },
            {
              "name": "openSUSE-SU-2012:1682",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5144",
    "datePublished": "2012-12-12T11:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:02.668Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2800
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "tile size ... mismatches parameters" and triggers "writing into a too small array."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"tile size ... mismatches parameters\" and triggers \"writing into a too small array.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2800",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"tile size ... mismatches parameters\" and triggers \"writing into a too small array.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2800",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2802
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "number of output channels" and "out of array writes."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"number of output channels\" and \"out of array writes.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2802",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"number of output channels\" and \"out of array writes.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=2c22701c371c2f3dea21fcdbb97c981939fb77af",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=2c22701c371c2f3dea21fcdbb97c981939fb77af"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2802",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.588Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9826
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
libavcodec/ituh263dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.519Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libavcodec/ituh263dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9826",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libavcodec/ituh263dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9826",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2783
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to "freeing the returned frame."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "name": "USN-1706-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1706-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to \"freeing the returned frame.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "name": "USN-1706-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1706-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2783",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to \"freeing the returned frame.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d85b3c4fff4c4b255232fcc01edbd57f19d60998",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d85b3c4fff4c4b255232fcc01edbd57f19d60998"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "USN-1706-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1706-1"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2783",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1931
Vulnerability from cvelistv5
Published
2011-07-07 21:00
Modified
2024-08-06 22:46
Severity ?
Summary
sp5xdec.c in the Sunplus SP5X JPEG decoder in libavcodec in FFmpeg before 0.6.3 and libav through 0.6.2, as used in VideoLAN VLC media player 1.1.9 and earlier and other products, performs a write operation outside the bounds of an unspecified array, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed AMV file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:46:00.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339"
          },
          {
            "name": "20110427 NGS00068 Patch Notification: LibAVCodec AMV Out of Array Write",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/517706"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32"
          },
          {
            "name": "8299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8299"
          },
          {
            "name": "47602",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47602"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sp5xdec.c in the Sunplus SP5X JPEG decoder in libavcodec in FFmpeg before 0.6.3 and libav through 0.6.2, as used in VideoLAN VLC media player 1.1.9 and earlier and other products, performs a write operation outside the bounds of an unspecified array, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed AMV file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-22T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339"
        },
        {
          "name": "20110427 NGS00068 Patch Notification: LibAVCodec AMV Out of Array Write",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/517706"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32"
        },
        {
          "name": "8299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8299"
        },
        {
          "name": "47602",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47602"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-1931",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sp5xdec.c in the Sunplus SP5X JPEG decoder in libavcodec in FFmpeg before 0.6.3 and libav through 0.6.2, as used in VideoLAN VLC media player 1.1.9 and earlier and other products, performs a write operation outside the bounds of an unspecified array, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed AMV file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339"
            },
            {
              "name": "20110427 NGS00068 Patch Notification: LibAVCodec AMV Out of Array Write",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/517706"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32"
            },
            {
              "name": "8299",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8299"
            },
            {
              "name": "47602",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47602"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1931",
    "datePublished": "2011-07-07T21:00:00",
    "dateReserved": "2011-05-09T00:00:00",
    "dateUpdated": "2024-08-06T22:46:00.718Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-7424
Vulnerability from cvelistv5
Published
2016-10-07 14:00
Modified
2024-08-06 01:57
Severity ?
Summary
The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.599Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee"
          },
          {
            "name": "DSA-3685",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3685"
          },
          {
            "name": "93038",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93038"
          },
          {
            "name": "[oss-security] 20160917 libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/16/17"
          },
          {
            "name": "[oss-security] 20160916 Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/17/1"
          },
          {
            "name": "[oss-security] 20160917 Re: Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/17/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=962"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-07T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee"
        },
        {
          "name": "DSA-3685",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3685"
        },
        {
          "name": "93038",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93038"
        },
        {
          "name": "[oss-security] 20160917 libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/16/17"
        },
        {
          "name": "[oss-security] 20160916 Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/17/1"
        },
        {
          "name": "[oss-security] 20160917 Re: Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/17/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=962"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7424",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://git.libav.org/?p=libav.git;a=commit;h=136f55207521f0b03194ef5b55ba70f1635d6aee",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=commit;h=136f55207521f0b03194ef5b55ba70f1635d6aee"
            },
            {
              "name": "DSA-3685",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3685"
            },
            {
              "name": "93038",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93038"
            },
            {
              "name": "[oss-security] 20160917 libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/16/17"
            },
            {
              "name": "[oss-security] 20160916 Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/17/1"
            },
            {
              "name": "[oss-security] 20160917 Re: Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/17/4"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=962",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=962"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7424",
    "datePublished": "2016-10-07T14:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.599Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-20001
Vulnerability from cvelistv5
Published
2018-12-10 02:00
Modified
2024-09-17 01:05
Severity ?
Summary
In Libav 12.3, there is a floating point exception in the range_decode_culshift function (called from range_decode_bits) in libavcodec/apedec.c that will lead to remote denial of service via crafted input.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:51:18.264Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1141"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav 12.3, there is a floating point exception in the range_decode_culshift function (called from range_decode_bits) in libavcodec/apedec.c that will lead to remote denial of service via crafted input."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-10T02:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1141"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-20001",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav 12.3, there is a floating point exception in the range_decode_culshift function (called from range_decode_bits) in libavcodec/apedec.c that will lead to remote denial of service via crafted input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1141",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1141"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-20001",
    "datePublished": "2018-12-10T02:00:00Z",
    "dateReserved": "2018-12-09T00:00:00Z",
    "dateUpdated": "2024-09-17T01:05:48.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4579
Vulnerability from cvelistv5
Published
2012-08-20 20:00
Modified
2024-09-17 01:30
Severity ?
Summary
The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to "dimensions changed."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:09:18.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
          },
          {
            "name": "MDVSA-2012:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
          },
          {
            "name": "USN-1320-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1320-1"
          },
          {
            "name": "MDVSA-2012:074",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
          },
          {
            "name": "MDVSA-2012:075",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "name": "USN-1333-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1333-1"
          },
          {
            "name": "20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/520620"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to \"dimensions changed.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
        },
        {
          "name": "MDVSA-2012:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
        },
        {
          "name": "USN-1320-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1320-1"
        },
        {
          "name": "MDVSA-2012:074",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
        },
        {
          "name": "MDVSA-2012:075",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "name": "USN-1333-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1333-1"
        },
        {
          "name": "20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/520620"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4579",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to \"dimensions changed.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229"
            },
            {
              "name": "MDVSA-2012:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229"
            },
            {
              "name": "USN-1320-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1320-1"
            },
            {
              "name": "MDVSA-2012:074",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
            },
            {
              "name": "MDVSA-2012:075",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "USN-1333-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1333-1"
            },
            {
              "name": "20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/520620"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4579",
    "datePublished": "2012-08-20T20:00:00Z",
    "dateReserved": "2011-11-29T00:00:00Z",
    "dateUpdated": "2024-09-17T01:30:40.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3936
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 23:53
Severity ?
Summary
The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.222Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1479-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1479-1"
          },
          {
            "name": "49089",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/"
          },
          {
            "name": "DSA-2471",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=2d1c0dea5f6b91bec7f5fa53ec050913d851e366"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-30T09:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "USN-1479-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1479-1"
        },
        {
          "name": "49089",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/"
        },
        {
          "name": "DSA-2471",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=2d1c0dea5f6b91bec7f5fa53ec050913d851e366"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3936",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-1479-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1479-1"
            },
            {
              "name": "49089",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49089"
            },
            {
              "name": "http://ffmpeg.org/",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/"
            },
            {
              "name": "DSA-2471",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2471"
            },
            {
              "name": "http://libav.org/",
              "refsource": "CONFIRM",
              "url": "http://libav.org/"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commitdiff;h=2d1c0dea5f6b91bec7f5fa53ec050913d851e366",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commitdiff;h=2d1c0dea5f6b91bec7f5fa53ec050913d851e366"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3936",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.222Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18244
Vulnerability from cvelistv5
Published
2018-03-22 21:00
Modified
2024-09-17 00:25
Severity ?
Summary
The stereo_processing function in libavcodec/aacps.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file, related to ff_ps_apply.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1105"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The stereo_processing function in libavcodec/aacps.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file, related to ff_ps_apply."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-22T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1105"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18244",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The stereo_processing function in libavcodec/aacps.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file, related to ff_ps_apply."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1105",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1105"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18244",
    "datePublished": "2018-03-22T21:00:00Z",
    "dateReserved": "2018-03-22T00:00:00Z",
    "dateUpdated": "2024-09-17T00:25:59.268Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17130
Vulnerability from cvelistv5
Published
2017-12-04 08:00
Modified
2024-08-05 20:43
Severity ?
Summary
The ff_free_picture_tables function in libavcodec/mpegpicture.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:43:59.783Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
          },
          {
            "name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_free_picture_tables function in libavcodec/mpegpicture.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-08T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
        },
        {
          "name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17130",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_free_picture_tables function in libavcodec/mpegpicture.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1100",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
            },
            {
              "name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17130",
    "datePublished": "2017-12-04T08:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:43:59.783Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18243
Vulnerability from cvelistv5
Published
2018-03-22 21:00
Modified
2024-09-17 03:33
Severity ?
Summary
The unpack_parse_unit function in libavcodec/dirac_parser.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault) via a crafted file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.295Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1088"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The unpack_parse_unit function in libavcodec/dirac_parser.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-22T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1088"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18243",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The unpack_parse_unit function in libavcodec/dirac_parser.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1088",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1088"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18243",
    "datePublished": "2018-03-22T21:00:00Z",
    "dateReserved": "2018-03-22T00:00:00Z",
    "dateUpdated": "2024-09-17T03:33:57.793Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3937
Vulnerability from cvelistv5
Published
2013-01-05 00:00
Modified
2024-08-06 23:53
Severity ?
Summary
The H.263 codec (libavcodec/h263dec.c) in FFmpeg 0.7.x before 0.7.12, 0.8.x before 0.8.11, and unspecified versions before 0.10, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 has unspecified impact and attack vectors related to "width/height changing with frame threads."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.223Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/news.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.263 codec (libavcodec/h263dec.c) in FFmpeg 0.7.x before 0.7.12, 0.8.x before 0.8.11, and unspecified versions before 0.10, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 has unspecified impact and attack vectors related to \"width/height changing with frame threads.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/news.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3937",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.263 codec (libavcodec/h263dec.c) in FFmpeg 0.7.x before 0.7.12, 0.8.x before 0.8.11, and unspecified versions before 0.10, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 has unspecified impact and attack vectors related to \"width/height changing with frame threads.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://git.libav.org/?p=libav.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba",
              "refsource": "CONFIRM",
              "url": "http://git.libav.org/?p=libav.git;a=commit;h=71db86d53b5c6872cea31bf714a1a38ec78feaba"
            },
            {
              "name": "http://libav.org/news.html",
              "refsource": "CONFIRM",
              "url": "http://libav.org/news.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3937",
    "datePublished": "2013-01-05T00:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2776
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an "out of picture write."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.430Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159"
          },
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an \"out of picture write.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159"
        },
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2776",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an \"out of picture write.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ba775a54bc2136ec5da85385a923b05ee6fab159",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ba775a54bc2136ec5da85385a923b05ee6fab159"
            },
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2776",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2779
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid "gop header" and decoding in a "half initialized context."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.530Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid \"gop header\" and decoding in a \"half initialized context.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2779",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid \"gop header\" and decoding in a \"half initialized context.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=229e4c133287955d5f3f837520a3602709b21950",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=229e4c133287955d5f3f837520a3602709b21950"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2779",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.530Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18247
Vulnerability from cvelistv5
Published
2018-03-23 19:00
Modified
2024-09-17 04:29
Severity ?
Summary
The av_audio_fifo_size function in libavutil/audio_fifo.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted media file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.234Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1089"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The av_audio_fifo_size function in libavutil/audio_fifo.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted media file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-23T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1089"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18247",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The av_audio_fifo_size function in libavutil/audio_fifo.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted media file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1089",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1089"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18247",
    "datePublished": "2018-03-23T19:00:00Z",
    "dateReserved": "2018-03-23T00:00:00Z",
    "dateUpdated": "2024-09-17T04:29:27.146Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-9051
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:55
Severity ?
Summary
libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:55:21.641Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1039"
          },
          {
            "name": "98548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98548"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-05-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-05-24T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1039"
        },
        {
          "name": "98548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98548"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-9051",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1039",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1039"
            },
            {
              "name": "98548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98548"
            },
            {
              "name": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24",
              "refsource": "MISC",
              "url": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-9051",
    "datePublished": "2017-05-18T06:13:00",
    "dateReserved": "2017-05-18T00:00:00",
    "dateUpdated": "2024-08-05T16:55:21.641Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-11224
Vulnerability from cvelistv5
Published
2018-05-17 04:00
Modified
2024-09-16 23:26
Severity ?
Summary
An issue was discovered in Libav 12.3. A read access violation in the in_table_init16 function in libavcodec/aacsbr.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:01:52.389Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1129"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Libav 12.3. A read access violation in the in_table_init16 function in libavcodec/aacsbr.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-17T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1129"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-11224",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Libav 12.3. A read access violation in the in_table_init16 function in libavcodec/aacsbr.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit",
              "refsource": "MISC",
              "url": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1129",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1129"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-11224",
    "datePublished": "2018-05-17T04:00:00Z",
    "dateReserved": "2018-05-16T00:00:00Z",
    "dateUpdated": "2024-09-16T23:26:13.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2790
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the "number of decoded samples in first sub-block in BGMC mode."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.553Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the \"number of decoded samples in first sub-block in BGMC mode.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2790",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the \"number of decoded samples in first sub-block in BGMC mode.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=2837d8dc276760db1821b81df3f794a90bfa56e6",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=2837d8dc276760db1821b81df3f794a90bfa56e6"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2790",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.553Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2801
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and "out of array writes."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.627Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and \"out of array writes.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2801",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and \"out of array writes.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1df49142bab1b7bccd11392aa9e819e297d21a6e",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1df49142bab1b7bccd11392aa9e819e297d21a6e"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2801",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.627Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2796
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in "coded slice positions and interlacing" that trigger "out of array writes."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.414Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.4.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "name": "MDVSA-2013:079",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          },
          {
            "name": "51257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51257"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in \"coded slice positions and interlacing\" that trigger \"out of array writes.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-10T15:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.4.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "name": "MDVSA-2013:079",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        },
        {
          "name": "51257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51257"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2796",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in \"coded slice positions and interlacing\" that trigger \"out of array writes.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5e59a77cec804a9b44c60ea22c17beba6453ef23",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5e59a77cec804a9b44c60ea22c17beba6453ef23"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.4.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.4.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "MDVSA-2013:079",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            },
            {
              "name": "51257",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51257"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2796",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.414Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-11102
Vulnerability from cvelistv5
Published
2018-05-15 02:00
Modified
2024-08-05 07:54
Severity ?
Summary
An issue was discovered in Libav 12.3. A read access violation in the mov_probe function in libavformat/mov.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:54:36.542Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1128"
          },
          {
            "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Libav 12.3. A read access violation in the mov_probe function in libavformat/mov.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-02T10:06:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1128"
        },
        {
          "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-11102",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Libav 12.3. A read access violation in the mov_probe function in libavformat/mov.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit",
              "refsource": "MISC",
              "url": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit"
            },
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1128",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1128"
            },
            {
              "name": "[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-11102",
    "datePublished": "2018-05-15T02:00:00",
    "dateReserved": "2018-05-14T00:00:00",
    "dateUpdated": "2024-08-05T07:54:36.542Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-5684
Vulnerability from cvelistv5
Published
2018-01-14 02:00
Modified
2024-08-05 05:40
Severity ?
Summary
In Libav through 12.2, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T05:40:51.162Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-01-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Libav through 12.2, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-14T06:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-5684",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Libav through 12.2, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1110",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-5684",
    "datePublished": "2018-01-14T02:00:00",
    "dateReserved": "2018-01-13T00:00:00",
    "dateUpdated": "2024-08-05T05:40:51.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2803
Vulnerability from cvelistv5
Published
2012-09-10 22:00
Modified
2024-08-06 19:42
Severity ?
Summary
Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.8.5.changelog"
          },
          {
            "name": "55355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55355"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a"
          },
          {
            "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
          },
          {
            "name": "USN-1706-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1706-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ffmpeg.org/security.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libav.org/releases/libav-0.7.7.changelog"
          },
          {
            "name": "USN-1705-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1705-1"
          },
          {
            "name": "50468",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50468"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.8.5.changelog"
        },
        {
          "name": "55355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55355"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a"
        },
        {
          "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
        },
        {
          "name": "USN-1706-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1706-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ffmpeg.org/security.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libav.org/releases/libav-0.7.7.changelog"
        },
        {
          "name": "USN-1705-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1705-1"
        },
        {
          "name": "50468",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50468"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-2803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
            },
            {
              "name": "http://libav.org/releases/libav-0.8.5.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.8.5.changelog"
            },
            {
              "name": "55355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/55355"
            },
            {
              "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a"
            },
            {
              "name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
            },
            {
              "name": "USN-1706-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1706-1"
            },
            {
              "name": "http://ffmpeg.org/security.html",
              "refsource": "CONFIRM",
              "url": "http://ffmpeg.org/security.html"
            },
            {
              "name": "http://libav.org/releases/libav-0.7.7.changelog",
              "refsource": "CONFIRM",
              "url": "http://libav.org/releases/libav-0.7.7.changelog"
            },
            {
              "name": "USN-1705-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1705-1"
            },
            {
              "name": "50468",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50468"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-2803",
    "datePublished": "2012-09-10T22:00:00",
    "dateReserved": "2012-05-19T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9819
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.525Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9819",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.525Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9824
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.437Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9824",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9824",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.437Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-5479
Vulnerability from cvelistv5
Published
2016-04-19 14:00
Modified
2024-08-06 06:50
Severity ?
Summary
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:02.435Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1685",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://libav.org/releases/libav-11.5.changelog"
          },
          {
            "name": "USN-2944-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2944-1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/"
          },
          {
            "name": "75932",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75932"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=0a49a62f998747cfa564d98d36a459fe70d3299b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1685",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://libav.org/releases/libav-11.5.changelog"
        },
        {
          "name": "USN-2944-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2944-1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/"
        },
        {
          "name": "75932",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75932"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=0a49a62f998747cfa564d98d36a459fe70d3299b"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-5479",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1685",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
            },
            {
              "name": "https://libav.org/releases/libav-11.5.changelog",
              "refsource": "CONFIRM",
              "url": "https://libav.org/releases/libav-11.5.changelog"
            },
            {
              "name": "USN-2944-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2944-1"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/"
            },
            {
              "name": "75932",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75932"
            },
            {
              "name": "https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-5479",
    "datePublished": "2016-04-19T14:00:00",
    "dateReserved": "2015-07-10T00:00:00",
    "dateUpdated": "2024-08-06T06:50:02.435Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-18245
Vulnerability from cvelistv5
Published
2018-03-23 19:00
Modified
2024-08-05 21:13
Severity ?
Summary
The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.212Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.libav.org/show_bug.cgi?id=1094"
          },
          {
            "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-05T20:06:07",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.libav.org/show_bug.cgi?id=1094"
        },
        {
          "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18245",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.libav.org/show_bug.cgi?id=1094",
              "refsource": "MISC",
              "url": "https://bugzilla.libav.org/show_bug.cgi?id=1094"
            },
            {
              "name": "[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18245",
    "datePublished": "2018-03-23T19:00:00",
    "dateReserved": "2018-03-23T00:00:00",
    "dateUpdated": "2024-08-05T21:13:49.212Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9821
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:59
Severity ?
Summary
Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:59:03.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94732",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94732"
          },
          {
            "name": "DSA-3833",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3833"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "94732",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94732"
        },
        {
          "name": "DSA-3833",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3833"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9821",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94732",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94732"
            },
            {
              "name": "DSA-3833",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3833"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9821",
    "datePublished": "2017-03-01T15:00:00",
    "dateReserved": "2016-12-04T00:00:00",
    "dateUpdated": "2024-08-06T02:59:03.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-7393
Vulnerability from cvelistv5
Published
2017-02-15 21:00
Modified
2024-08-06 01:57
Severity ?
Summary
Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.523Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=fb1473080223a634b8ac2cca48a632d037a0a69d"
          },
          {
            "name": "[oss-security] 20160910 Re: libav: out-of-bounds stack read",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/10/5"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/"
          },
          {
            "name": "92902",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92902"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=fb1473080223a634b8ac2cca48a632d037a0a69d"
        },
        {
          "name": "[oss-security] 20160910 Re: libav: out-of-bounds stack read",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/10/5"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/"
        },
        {
          "name": "92902",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92902"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7393",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://git.libav.org/?p=libav.git;a=commit;h=fb1473080223a634b8ac2cca48a632d037a0a69d",
              "refsource": "CONFIRM",
              "url": "https://git.libav.org/?p=libav.git;a=commit;h=fb1473080223a634b8ac2cca48a632d037a0a69d"
            },
            {
              "name": "[oss-security] 20160910 Re: libav: out-of-bounds stack read",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/10/5"
            },
            {
              "name": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/",
              "refsource": "MISC",
              "url": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/"
            },
            {
              "name": "92902",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92902"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7393",
    "datePublished": "2017-02-15T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.523Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an "out of picture write."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an \"out of picture write.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n decode_cell_data en libavcodec/indeo3.c en FFmpeg anterior a v0.11 tiene un impacto desconocido y vectores de ataque, relacionado con un \"fuera de grabaci\u00f3n de im\u00e1genes.\""
    }
  ],
  "id": "CVE-2012-2776",
  "lastModified": "2024-11-21T01:39:36.560",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.180",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-03 16:55
Modified
2024-11-21 02:11
Severity ?
Summary
Heap-based buffer overflow in the encode_slice function in libavcodec/proresenc_kostya.c in FFMpeg before 1.1.14, 1.2.x before 1.2.8, 2.x before 2.2.7, and 2.3.x before 2.3.3 and Libav before 10.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 1.1
ffmpeg ffmpeg 1.1.1
ffmpeg ffmpeg 1.1.2
ffmpeg ffmpeg 1.1.3
ffmpeg ffmpeg 1.1.4
ffmpeg ffmpeg 1.1.5
ffmpeg ffmpeg 1.1.6
ffmpeg ffmpeg 1.1.7
ffmpeg ffmpeg 1.1.8
ffmpeg ffmpeg 1.1.9
ffmpeg ffmpeg 1.1.10
ffmpeg ffmpeg 1.1.11
ffmpeg ffmpeg 1.1.12
ffmpeg ffmpeg 1.2
ffmpeg ffmpeg 1.2.1
ffmpeg ffmpeg 1.2.3
ffmpeg ffmpeg 1.2.4
ffmpeg ffmpeg 1.2.5
ffmpeg ffmpeg 1.2.6
ffmpeg ffmpeg 1.2.7
ffmpeg ffmpeg 2.0
ffmpeg ffmpeg 2.0.1
ffmpeg ffmpeg 2.0.2
ffmpeg ffmpeg 2.0.3
ffmpeg ffmpeg 2.0.4
ffmpeg ffmpeg 2.0.5
ffmpeg ffmpeg 2.1
ffmpeg ffmpeg 2.1.1
ffmpeg ffmpeg 2.1.2
ffmpeg ffmpeg 2.1.3
ffmpeg ffmpeg 2.1.4
ffmpeg ffmpeg 2.1.5
ffmpeg ffmpeg 2.2
ffmpeg ffmpeg 2.2.4
ffmpeg ffmpeg 2.3
ffmpeg ffmpeg 2.3.2
libav libav *
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.5.8
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
libav libav 0.8.5
libav libav 0.8.6
libav libav 0.8.7
libav libav 0.8.8
libav libav 0.8.9
libav libav 0.8.10
libav libav 0.8.11
libav libav 0.8.12
libav libav 10.1
libav libav 10.2
libav libav 10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBDCECF-B44E-415C-80ED-DB15332F7BFD",
              "versionEndIncluding": "1.1.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "192F65AB-99F2-4722-B1A2-737A87282447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E30DB1-0CFC-4EAA-BF07-CE7551ABDCB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBA7D745-DC16-43B9-8A2D-4D6944A6BFD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A511A5-2040-433A-9B32-B89332214FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C01DD9C-98C9-4896-8D66-A8336582298B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9BF628-8AE0-4D4A-9E9E-02C679B2BE3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE4D23F3-5D03-4192-B02B-F5D78420359B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F82CFB87-303C-4009-81CB-124D34446E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F87B18-B869-4608-81B8-DC30F3AEA728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5559F046-434D-4F9C-A6E2-F2E4196235BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "48216C77-CEDA-4F6B-8A24-1C22328AEEFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F8A300D-1771-4160-B649-4DD31A522454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6610C93A-059A-4151-A169-06CCF06D20AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE7723A-3D6B-4390-B82E-6A5A6992141A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED8FF93-5AA7-443C-BBDB-845736BB337B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F779F23A-5D19-414A-A0D4-1A1C12B2B268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C18AE4-911C-4E59-AF0C-972CD20D8780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5204A44-FB87-4CD1-8923-CFA5784D78EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C996BBC7-62F2-4100-A0C9-883DFF7C4593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "48D7C541-CB05-423C-9810-CE7BFACB569D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1337F5B-E9D9-4335-9E05-50018E59E530",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B27C609-E4B4-41CD-B228-38267AA3A8AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97DBEE2-AF4E-4C2D-A185-F2A1B965D9DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDEDAA24-D9E0-4384-B193-0C8814E4FDD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B0C71E-341A-434A-90AE-326097AC85E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83D73FF-E6F6-4399-B721-6C6275C52B55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70C00A9-3562-45AB-B494-3BA91B6AFC3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A30389D2-2873-4F15-B249-066B6D37AC23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0487928D-6630-4E23-BBA5-BED0A0F156B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3088131-C48D-463B-8709-78A90EDE1FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADF01E6-CB58-4593-B444-A59232EE83CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06442F70-22B4-49E5-B25B-92E03973B57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B08A7BE-7C98-4659-808F-86A8EB4676D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9CF7C7-3730-43EC-B63E-B004D979E57A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "207DF654-326E-43A9-A5EC-BC239BF30422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B50AB2A-FA23-4BB0-AA21-724E770ADEFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "037F40EC-D223-43E3-80A9-41FB66A114B2",
              "versionEndIncluding": "10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFE2D9C-406B-48FB-A810-9F1C2FB42484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D440FB2-C357-45B9-A4BA-B4AE8444ACC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E89124C-D0DE-494E-A86E-C8D5A60808E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BFC27A-684F-4605-9272-6065CDD57098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "03543D1E-1601-4343-A9BA-19CAAFB34293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1078353-5E19-4470-8920-E7516D7F83D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DFDAE74-395A-46FB-AC3E-23B4B564C409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBAF4097-22FD-4C89-B3DC-8B3485731DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E2DB2F5-F15C-46E8-B849-A62E3CB0D341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F5C136-547E-4276-9F1D-50269CFCCDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D0EDE5-D07E-44DB-928F-D152A45DA5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B3AE25-BC95-4F18-A90C-2301942FCC27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the encode_slice function in libavcodec/proresenc_kostya.c in FFMpeg before 1.1.14, 1.2.x before 1.2.8, 2.x before 2.2.7, and 2.3.x before 2.3.3 and Libav before 10.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n encode_slice en libavcodec/proresenc_kostya.c en FFMpeg anterior a 1.1.14, 1.2.x anterior a 1.2.8, 2.x anterior a 2.2.7, y 2.3.x anterior a 2.3.3 y Libav anterior a 10.5 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-5271",
  "lastModified": "2024-11-21T02:11:44.647",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-03T16:55:05.573",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=52b81ff4635c077b2bc8b8d3637d933b6629d803"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/111725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/69250"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201603-06"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=52b81ff4635c077b2bc8b8d3637d933b6629d803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/111725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/69250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201603-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ffmpeg.org/security.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en libavcodec/mpegvideo_parser.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un archivo manipulado."
    }
  ],
  "id": "CVE-2016-9821",
  "lastModified": "2024-11-21T03:01:48.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.477",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2017/dsa-3833"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-05 00:55
Modified
2024-11-21 01:31
Severity ?
Summary
The H.263 codec (libavcodec/h263dec.c) in FFmpeg 0.7.x before 0.7.12, 0.8.x before 0.8.11, and unspecified versions before 0.10, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 has unspecified impact and attack vectors related to "width/height changing with frame threads."
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.5.8
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A79213F-BAB7-4FF2-99AC-91BFAF4BF2CF",
              "versionEndIncluding": "0.9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFE2D9C-406B-48FB-A810-9F1C2FB42484",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The H.263 codec (libavcodec/h263dec.c) in FFmpeg 0.7.x before 0.7.12, 0.8.x before 0.8.11, and unspecified versions before 0.10, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 has unspecified impact and attack vectors related to \"width/height changing with frame threads.\""
    },
    {
      "lang": "es",
      "value": "El  codificador-decodificador H.263 (libavcodec/h263dec.c) en FFmpeg versi\u00f3n 0.7.x anterior a 0.7.12, versi\u00f3n 0.8.x anterior a  0.8.11, y versiones no espec\u00edficas anterior a  0.10, y en Libav versi\u00f3n 0.5.x anterior a  0.5.9, versi\u00f3n 0.6.x anterior a  0.6.6, versi\u00f3n 0.7.x anterior a  0.7.5 y versi\u00f3n 0.8.x anterior a  0.8.1, tiene vectores de ataque y de impacto no espec\u00edficos relacionados con el \"width/height changing with frame threads.\""
    }
  ],
  "id": "CVE-2011-3937",
  "lastModified": "2024-11-21T01:31:34.017",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-05T00:55:02.430",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/news.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=71db86d53b5c6872cea31bf714a1a38ec78feaba"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-28 06:29
Modified
2024-11-21 03:37
Summary
There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack.
Impacted products
Vendor Product Version
libav libav 12.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99846C93-A0F8-459D-AC79-A79CDE487505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack."
    },
    {
      "lang": "es",
      "value": "Hay un desbordamiento de b\u00fafer basado en heap en la funci\u00f3n hpel_motion en mpegvideo_motion.c en libav 12.1. Una entrada hecha a mano puede producir un ataque remoto de denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2017-9987",
  "lastModified": "2024-11-21T03:37:18.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-28T06:29:00.333",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1067"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A79213F-BAB7-4FF2-99AC-91BFAF4BF2CF",
              "versionEndIncluding": "0.9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n dpcm_decode_frame en dpcm.c en libavcodec de FFmpeg antes de v0.10 y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6 y v0.8.x antes de v0.8.1 permite provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a atacantes remotos a trav\u00e9s de una se\u00f1al est\u00e9reo dise\u00f1ada para tal fin en un archivo multimedia.\r\n"
    }
  ],
  "id": "CVE-2011-3951",
  "lastModified": "2024-11-21T01:31:35.147",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.263",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=ce7aee9b733134649a6ce2fa743e51733f33e67e"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=ce7aee9b733134649a6ce2fa743e51733f33e67e"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-01-18 07:29
Modified
2024-11-21 04:09
Summary
In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26FBC73-EA2B-4DA4-915B-CCAC8DCB9E55",
              "versionEndIncluding": "12.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file."
    },
    {
      "lang": "es",
      "value": "En Libav hasta la versi\u00f3n 12.2, hay una llamada memcpy no v\u00e1lida en la funci\u00f3n av_packet_ref de libavcodec/avpacket.c. Los atacantes remotos pueden aprovechar esta vulnerabilidad para provocar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) mediante un archivo avi manipulado."
    }
  ],
  "id": "CVE-2018-5766",
  "lastModified": "2024-11-21T04:09:21.300",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-18T07:29:00.233",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/102793"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1112"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/102793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-09 11:29
Modified
2024-11-21 03:57
Summary
In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** En Libav 12.3, hay un acceso de memoria no v\u00e1lido en vc1_decode_frame en libavcodec/vc1dec.c que permite que los atacantes provoquen una denegaci\u00f3n de servicio (DoS) mediante un archivo aac dise\u00f1ado. NOTA: Esto puede ser un duplicado de CVE-2017-17127."
    }
  ],
  "id": "CVE-2018-19130",
  "lastModified": "2024-11-21T03:57:23.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-09T11:29:03.830",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1139"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    },
    {
      "source": "nvd@nist.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
libavcodec/ituh263dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libavcodec/ituh263dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
    },
    {
      "lang": "es",
      "value": "libavcodec/ituh263dec.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores que implican desplazamiento a la izquierda de un valor negativo."
    }
  ],
  "id": "CVE-2016-9826",
  "lastModified": "2024-11-21T03:01:49.017",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.617",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers "use of uninitialized streams."
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers \"use of uninitialized streams.\""
    },
    {
      "lang": "es",
      "value": "nsvdec.c en libavcodec de FFmpeg en v0.7.x antes de v0.7.12 y v0.8.x antes de v0.8.11, y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.5 y v0.8.x antes de v0.8.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura y escritura fuera de l\u00edmites) a trav\u00e9s de un archivo modificado que provoca \"el uso de flujos sin inicializar\".\r\n"
    }
  ],
  "id": "CVE-2011-3940",
  "lastModified": "2024-11-21T01:31:34.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.153",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c898431ca5ef2a997fe9388b650f658fb60783e5"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5c011706bc752d34bc6ada31d7df2ca0c9af7c6b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=8fd8a48263ff1437f9d02d7e78dc63efb9b5ed3a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c898431ca5ef2a997fe9388b650f658fb60783e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 21:59
Modified
2024-11-21 02:59
Summary
The get_vlc2 function in get_bits.h in Libav 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file. NOTE: this issue exists due to an incomplete fix for CVE-2016-8675.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95477BE5-1F6F-4DC2-85A7-6C2DC1ECB6F0",
              "versionEndIncluding": "11.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The get_vlc2 function in get_bits.h in Libav 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file.  NOTE: this issue exists due to an incomplete fix for CVE-2016-8675."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n get_vlc2 en get_bits.h en Libav 11.9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de un archivo mp3 manipulado. NOTA: este problema existe debido a una correcci\u00f3n incompleta para CVE-2016-8675."
    }
  ],
  "id": "CVE-2016-8676",
  "lastModified": "2024-11-21T02:59:49.207",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T21:59:00.387",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/12/04/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93468"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/12/04/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
    },
    {
      "lang": "es",
      "value": "libavcodec/mpegvideo.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores que implican desplazamiento a la izquierda de un valor negativo."
    }
  ],
  "id": "CVE-2016-9819",
  "lastModified": "2024-11-21T03:01:48.047",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-19 14:59
Modified
2024-11-21 02:33
Summary
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
Impacted products
Vendor Product Version
ubuntu ubuntu 12.04
libav libav *
opensuse leap 42.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu:12.04:*:lts:*:*:*:*:*",
              "matchCriteriaId": "799EB7BF-2E7E-42EF-A5A8-AADE2F003B4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "032D8A36-9593-448C-98B1-8B55D8D712A8",
              "versionEndIncluding": "11.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_h263_decode_mba en libavcodec/ituh263dec.c en Libav en versiones anteriores a 11.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error de divisi\u00f3n por cero y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un archivo con dimensiones manipuladas."
    }
  ],
  "id": "CVE-2015-5479",
  "lastModified": "2024-11-21T02:33:06.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-19T14:59:00.140",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/75932"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2944-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=0a49a62f998747cfa564d98d36a459fe70d3299b"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libav.org/releases/libav-11.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/75932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2944-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://blogs.gentoo.org/ago/2015/07/16/libav-divide-by-zero-in-ff_h263_decode_mba/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=0a49a62f998747cfa564d98d36a459fe70d3299b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libav.org/releases/libav-11.5.changelog"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n decode_wdlt en libavcodec/dfa.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con una \"escritura fuera de una matriz.\"\r\n"
    }
  ],
  "id": "CVE-2012-2786",
  "lastModified": "2024-11-21T01:39:37.800",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.537",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "setup width/height."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"setup width/height.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n decode_frame en libavcodec/indeo4.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con la asignaci\u00f3n de una \"anchura y altura\".\r\n"
    }
  ],
  "id": "CVE-2012-2787",
  "lastModified": "2024-11-21T01:39:37.927",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.570",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 20:55
Modified
2024-11-21 01:31
Severity ?
Summary
The decode_frame function in the KVG1 decoder (kgv1dec.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted media file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decode_frame function in the KVG1 decoder (kgv1dec.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted media file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n decode_frame en el decodificador KVG1 (kgv1dec.c) en libavcodec en FFmpeg v0.7.x anterior a v0.7.12 y v0.8.x anterior a v0.8.11, y en Libav v0.5.x anterior a v0.5.9, v0.6.x anterior a v0.6.6, v0.7.x anterior a v0.7.5, y v0.8.x anterior a v0.8.1 permite a usuarios remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de un fichero multimedia manipulado."
    }
  ],
  "id": "CVE-2011-3945",
  "lastModified": "2024-11-21T01:31:34.540",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T20:55:02.673",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=807a045ab7f51993a2c1b3116016cbbd4f3d20d6"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=a02e8df973f5478ec82f4c507f5b5b191a5ecb6b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=807a045ab7f51993a2c1b3116016cbbd4f3d20d6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "allocated tile size ... mismatches parameters."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"allocated tile size ... mismatches parameters.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n decode_mb_info en libavcodec/indeo5.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos en el que el \"tama\u00f1o asignado ... desajusta los par\u00e1metros.\""
    }
  ],
  "id": "CVE-2012-2794",
  "lastModified": "2024-11-21T01:39:38.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.883",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
The decode_init function in kmvc.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large palette size in a KMVC encoded file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A79213F-BAB7-4FF2-99AC-91BFAF4BF2CF",
              "versionEndIncluding": "0.9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decode_init function in kmvc.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large palette size in a KMVC encoded file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n decode_init en kmvc.c en libavcodec de FFmpeg antes de v0.10 y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6, y v0.8.x antes de v0.8.1 permite provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a atacantes remotos a trav\u00e9s de un tama\u00f1o de paleta demasiado grande en un archivo KMVC codificado.\r\n"
    }
  ],
  "id": "CVE-2011-3952",
  "lastModified": "2024-11-21T01:31:35.277",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.310",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=386741f887714d3e46c9e8fe577e326a7964037b"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=386741f887714d3e46c9e8fe577e326a7964037b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:36
Severity ?
Summary
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size.
Impacted products
Vendor Product Version
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.8
libav libav 0.8
libav libav 0.8.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (\u0027heap\u0027) en la funci\u00f3n vqa_decode_chunk en el c\u00f3dec VQA (vqavideo.c) en libavcodec en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6 y v0.8.x antes de v0.8.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo multimedia VQA modificado en el que el tama\u00f1o de la imagen no es m\u00faltiplo del tama\u00f1o del bloque.\r\n"
    }
  ],
  "id": "CVE-2012-0947",
  "lastModified": "2024-11-21T01:36:01.617",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.950",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://libav.org/"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/03/4"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.securityfocus.com/bid/53389"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/03/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2777.
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2777."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n decode_pic en libavcodec/cavsdec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con \"el cambio de anchura/altura en CAVS\". Es una vulnerabilidad diferente a CVE-2012-2777a.\r\n"
    }
  ],
  "id": "CVE-2012-2784",
  "lastModified": "2024-11-21T01:39:37.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.447",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-18 06:29
Modified
2024-11-21 03:35
Severity ?
Summary
libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04543676-A771-4E9A-95A9-7C4D4F88B055",
              "versionEndIncluding": "12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c."
    },
    {
      "lang": "es",
      "value": "libav en versiones anteriores a la 12.1 es vulnerable a una lectura inv\u00e1lida de tama\u00f1o 1 debido a una desreferencia de puntero NULL en la funci\u00f3n nsv_read_chunk en libavformat/nsvdec.c."
    }
  ],
  "id": "CVE-2017-9051",
  "lastModified": "2024-11-21T03:35:13.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-05-18T06:29:00.527",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/98548"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1039"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/98548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n dv_extract_audio en libavcodec de FFmpeg en v0.7.x antes de v0.7.12 y v0.8.x antes de y v0.8.11 y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.5 y v0.8.x antes de v0.8.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una archivo DV modificado.\r\n"
    }
  ],
  "id": "CVE-2011-3936",
  "lastModified": "2024-11-21T01:31:33.897",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:01.683",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=2d1c0dea5f6b91bec7f5fa53ec050913d851e366"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=2d1c0dea5f6b91bec7f5fa53ec050913d851e366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
    },
    {
      "lang": "es",
      "value": "libavcodec/mpegvideo_motion.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores que implican desplazamiento a la izquierda de un valor negativo."
    }
  ],
  "id": "CVE-2016-9820",
  "lastModified": "2024-11-21T03:01:48.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.463",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-21 06:59
Modified
2024-11-21 03:31
Summary
The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
Impacted products
Vendor Product Version
libav libav 9.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC929204-B8FE-48AE-8D32-DC6BFCB99DC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_h2645_extract_rbsp en libavcodec en libav 9.21 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica) u obtener informaci\u00f3n sensible de la memoria de proceso y a trav\u00e9s de un archivo de video h264 manipulado."
    }
  ],
  "id": "CVE-2017-7206",
  "lastModified": "2024-11-21T03:31:22.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-21T06:59:00.383",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/97006"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/97006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1002"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-21 06:59
Modified
2024-11-21 03:31
Summary
The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
Impacted products
Vendor Product Version
libav libav 9.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC929204-B8FE-48AE-8D32-DC6BFCB99DC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n decode_residual en libavcodec en libav 9.21permite a atacantes remotos provocar una denegaci\u00f3n del servicio (sobre lectura del b\u00fafer) u obtener informaci\u00f3n sensible de los procesos de memoria a trav\u00e9s de un archivo de video h264 manipulado."
    }
  ],
  "id": "CVE-2017-7208",
  "lastModified": "2024-11-21T03:31:22.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-21T06:59:00.447",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2017/dsa-4012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/97005"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-4012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/97005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1000"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to "freeing the returned frame."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.5.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1705-1
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1706-1
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.5.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1705-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1706-1
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to \"freeing the returned frame.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en libavcodec/vp56.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con la \"liberaci\u00f3n del marco regresado\".\r\n"
    }
  ],
  "id": "CVE-2012-2783",
  "lastModified": "2024-11-21T01:39:37.370",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.397",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1706-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1706-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to "reallocation code" and the luma height and width.
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to \"reallocation code\" and the luma height and width."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en libavcodec/indeo3.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos, relacionados con una \"reasignaci\u00f3n de c\u00f3digo\" y la altura y anchura del plano \u0027luma\u0027 o de luminancia.\r\n"
    }
  ],
  "id": "CVE-2012-2804",
  "lastModified": "2024-11-21T01:39:40.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.337",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4a80ebe491609e04110a1dd540a0ca79d3be3d04"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4a80ebe491609e04110a1dd540a0ca79d3be3d04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs).
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs)."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n avi_read_packet en libavformat/avidec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con un n\u00famero demasiado grande de coeficientes de vectores (num_vec_coeffs).\r\n"
    }
  ],
  "id": "CVE-2012-2789",
  "lastModified": "2024-11-21T01:39:38.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.663",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-10-07 14:59
Modified
2024-11-21 02:57
Summary
The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file.
References
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3685Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2016/09/16/17Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2016/09/17/1Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2016/09/17/4Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/93038Broken Link
cve@mitre.orghttps://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/Third Party Advisory
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=962Issue Tracking
cve@mitre.orghttps://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3685Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/09/16/17Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/09/17/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/09/17/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/93038Broken Link
af854a3a-2127-422b-91ae-364da2661108https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=962Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee
Impacted products
Vendor Product Version
debian debian_linux 8.0
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E17410F-4E7D-4B6B-BD0C-C9B505A11534",
              "versionEndIncluding": "11.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n put_no_rnd_pixels8_xy2_mmx en x86/rnd_template.c en libav 11.7 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de un archivo MP3 manipulado."
    }
  ],
  "id": "CVE-2016-7424",
  "lastModified": "2024-11-21T02:57:58.817",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-10-07T14:59:09.177",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3685"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/16/17"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/17/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/17/4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/93038"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=962"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/16/17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/17/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/93038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=962"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 21:59
Modified
2024-11-21 02:59
Summary
The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95477BE5-1F6F-4DC2-85A7-6C2DC1ECB6F0",
              "versionEndIncluding": "11.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n get_vlc2 en get_bits.h en Libav en versiones anteriores a 11.9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de un archivo mp3 manipulado, posiblemente relacionado con secuencias de c\u00f3digo de inicio durante la detecci\u00f3n de m4v."
    }
  ],
  "id": "CVE-2016-8675",
  "lastModified": "2024-11-21T02:59:49.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T21:59:00.357",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93468"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/10/16/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/07/libav-null-pointer-dereference-in-get_vlc2_get_bits_h/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an ADPCM file with the number of channels not equal to two.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15FD45D-03F0-4EA0-9CEB-B7E7C62478D0",
              "versionEndIncluding": "0.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an ADPCM file with the number of channels not equal to two."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n adpcm_decode_frame en adpcm.c en libavcodec de FFmpeg antes en v0.9.1 y v0.5.x antes en Libav v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6, y v0.8.x antes de v0.8.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo ADPCM con el n\u00famero de canales distinto a dos.\r\n"
    }
  ],
  "id": "CVE-2012-0852",
  "lastModified": "2024-11-21T01:35:50.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.777",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=608708009f69ba4cecebf05120c696167494c897"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78932"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ffmpeg.org/trac/ffmpeg/ticket/794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=608708009f69ba4cecebf05120c696167494c897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ffmpeg.org/trac/ffmpeg/ticket/794"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 02:10
Summary
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
Impacted products
Vendor Product Version
libav libav *
libav libav *
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5768A3-7A9D-411A-A7FF-0460DC689381",
              "versionEndExcluding": "0.8.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DDCB364-A4FB-4547-86E0-7C21621B61EC",
              "versionEndExcluding": "9.14",
              "versionStartIncluding": "9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CF9C775-3525-4430-A3D9-F7EB0BA63793",
              "versionEndExcluding": "10.2",
              "versionStartIncluding": "10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de enteros en la funci\u00f3n get_len en el archivo libavutil/lzo.c en Libav versiones anteriores a 0.8.13, versiones 9.x anteriores a 9.14 y versiones 10.x anteriores a 10.2, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una Ejecuci\u00f3n Literal dise\u00f1ada."
    }
  ],
  "id": "CVE-2014-4609",
  "lastModified": "2024-11-21T02:10:33.510",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-14T16:15:11.307",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/06/26/22"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libav.org/news/#2014-06-27"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/06/26/22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libav.org/news/#2014-06-27"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en libavcodec/mpeg12dec.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un archivo manipulado."
    }
  ],
  "id": "CVE-2016-9822",
  "lastModified": "2024-11-21T03:01:48.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.510",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2017/dsa-3833"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-30 13:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Libav 12.3. An access violation allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv. This is related to ff_mpa_synth_filter_float in avcodec/mpegaudiodsp_template.c. NOTE: This may be a duplicate of CVE-2018-19129
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1161#c0Broken Link, Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1161#c0Broken Link, Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Libav 12.3. An access violation allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv. This is related to ff_mpa_synth_filter_float in avcodec/mpegaudiodsp_template.c. NOTE: This may be a duplicate of CVE-2018-19129"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** Se detect\u00f3 un problema en Libav versi\u00f3n 12.3. Una violaci\u00f3n de acceso permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n), como es demostrado por avconv. Esto est\u00e1 relacionado con la funci\u00f3n ff_mpa_synth_filter_float en el archivo avcodec/mpegaudiodsp_template.c. NOTA: Esto puede ser un duplicado de CVE-2018-19129."
    }
  ],
  "id": "CVE-2019-14441",
  "lastModified": "2024-11-21T04:26:45.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-30T13:15:18.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c0"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-30 13:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
libav libav 12.3
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en Libav versi\u00f3n 12.3. La divisi\u00f3n por cero en la funci\u00f3n range_decode_culshift en el archivo libavcodec/apedec.c permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n), como es demostrado por avconv."
    }
  ],
  "id": "CVE-2019-14443",
  "lastModified": "2024-11-21T04:26:45.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-30T13:15:18.530",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1161#c1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-369"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-16 18:59
Modified
2024-11-21 02:49
Summary
The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file.
Impacted products
Vendor Product Version
libav libav *
ffmpeg ffmpeg *
debian debian_linux *
opensuse leap 42.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C87D33-61F9-4668-B6F7-EAC88169C48A",
              "versionEndIncluding": "11.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E92A173-3346-4B06-96CD-B0D06AE0A359",
              "versionEndIncluding": "0.10.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35AC9E8-6666-4AB2-91B7-B77DF2DF48B9",
              "versionEndIncluding": "8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n mov_read_dref en libavformat/mov.c en Libav en versiones anteriores a 11.7 y FFmpeg en versiones anteriores a 0.11 permite a atacantes remotos provocar una denegaci\u00f3n de srevicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de valores de entrada en una caja dref en un archivo MP4."
    }
  ],
  "id": "CVE-2016-3062",
  "lastModified": "2024-11-21T02:49:17.017",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-16T18:59:08.373",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3603"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=929"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://ffmpeg.org/security.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://libav.org/releases/libav-11.7.changelog"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201705-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00105.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://libav.org/releases/libav-11.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201705-08"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to "dimensions changed."
References
secalert@redhat.comhttp://ffmpeg.org/Vendor Advisory
secalert@redhat.comhttp://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229
secalert@redhat.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229
secalert@redhat.comhttp://libav.org/Vendor Advisory
secalert@redhat.comhttp://ubuntu.com/usn/usn-1320-1
secalert@redhat.comhttp://ubuntu.com/usn/usn-1333-1
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:074
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:075
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:076
secalert@redhat.comhttp://www.securityfocus.com/archive/1/520620
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229
af854a3a-2127-422b-91ae-364da2661108http://libav.org/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1320-1
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1333-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:074
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:075
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:076
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/520620
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.5
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "32A152D9-947E-4198-9C2D-2A582F09AB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to \"dimensions changed.\""
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n svq1_decode_frame en el decodificador SVQ1 (svq1dec.c) en libavcodec en FFmpeg v0.5.x anterior a v0.5.7, v0.6.x anterior a v0.6.4, v0.7.x anterior a v0.7.9, y v0.8.x anterior a v0.8.8; y en Libav v0.5.x anterior a v0.5.6, v0.6.x anterior a v0.6.4, y v0.7.x anterior a v0.7.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un (stream) SVQ1 modificado y relacionado con \"dimensiones modificadas\"."
    }
  ],
  "id": "CVE-2011-4579",
  "lastModified": "2024-11-21T01:32:35.583",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T20:55:03.017",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/520620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/520620"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "tile size ... mismatches parameters" and triggers "writing into a too small array."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the \"tile size ... mismatches parameters\" and triggers \"writing into a too small array.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n ff_ivi_process_empty_tile en libavcodec/ivi_common.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos en los que \"el tama\u00f1o del cuadro no se ajusta a los par\u00e1metros\" y esto ocasiona la \"escritura en una matriz demasiado peque\u00f1a\".\r\n"
    }
  ],
  "id": "CVE-2012-2800",
  "lastModified": "2024-11-21T01:39:39.637",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.163",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.5.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1705-1
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.5.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1705-1
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array write.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n decode_dds1 en libavcodec/dfa.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con una \"escritura fuera de array\".\r\n"
    }
  ],
  "id": "CVE-2012-2798",
  "lastModified": "2024-11-21T01:39:39.373",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.070",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
The (1) av_image_fill_pointers, (2) vp5_parse_coeff, and (3) vp6_parse_coeff functions in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted VP5 or VP6 stream.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.5
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "32A152D9-947E-4198-9C2D-2A582F09AB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) av_image_fill_pointers, (2) vp5_parse_coeff, and (3) vp6_parse_coeff functions in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted VP5 or VP6 stream."
    },
    {
      "lang": "es",
      "value": "Las funciones (1) av_image_fill_pointers, (2) vp5_parse_coeff, y (3) vp6_parse_coeff en FFmpeg v0.5.x anterior a v0.5.7, v0.6.x anterior a v0.6.4, v0.7.x anterior a v0.7.9, y v0.8.x anterior a v0.8.8; y en Libav v0.5.x anterior a v0.5.6, v0.6.x anterior a v0.6.4, y v0.7.x anterior a v0.7.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un (stream) VP5 o VP6 manipulado."
    }
  ],
  "id": "CVE-2011-4353",
  "lastModified": "2024-11-21T01:32:17.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T20:55:02.893",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the "number of decoded samples in first sub-block in BGMC mode."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the \"number of decoded samples in first sub-block in BGMC mode.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n read_var_block_data en libavcodec/alsdec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con el \"n\u00famero de muestras descodificados en el primer sub-bloque en el modo BGMC.\"\r\n"
    }
  ],
  "id": "CVE-2012-2790",
  "lastModified": "2024-11-21T01:39:38.313",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.710",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
Buffer overflow in mjpegbdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MJPEG-B file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in mjpegbdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MJPEG-B file."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en mjpegbdec.c en libavcodec en FFmpeg v0.7.x antes de v0.7.12 y v0.8.x antes de v0.8.11, y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.5, y v0.8.x antes de v0.8.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo MJPEG-B modificado."
    }
  ],
  "id": "CVE-2011-3947",
  "lastModified": "2024-11-21T01:31:34.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.217",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=b57d262412204e54a7ef8fa1b23ff4dcede622e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en libswscale/x86/swscale.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una archivo manipulado."
    }
  ],
  "id": "CVE-2016-9824",
  "lastModified": "2024-11-21T03:01:48.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-30 06:29
Modified
2024-11-21 03:56
Summary
There exists a heap-based buffer overflow in vc1_decode_p_mb_intfi in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There exists a heap-based buffer overflow in vc1_decode_p_mb_intfi in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
    },
    {
      "lang": "es",
      "value": "Existe un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en vc1_decode_p_mb_intfi en vc1_block.c en Libav 12.3 que puede permitir que los atacantes provoquen una denegaci\u00f3n de servicio (DoS) mediante un archivo aac manipulado."
    }
  ],
  "id": "CVE-2018-18826",
  "lastModified": "2024-11-21T03:56:41.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-30T06:29:00.483",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n decodeTonalComponents en el codec Actrac3 (atrac3.c) en libavcodec de FFmpeg v0.7.x antes de v0.7.12, y v0.8.x antes de v0.8.11, y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6 , v0.7.x antes de v0.7.5 y v0.8.x antes de v0.8.1 permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (bucle infinito y ca\u00edda) y posiblemente ejecuten c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un gran n\u00famero de componentes en un archivo Atrac 3.\r\n"
    }
  ],
  "id": "CVE-2012-0853",
  "lastModified": "2024-11-21T01:35:50.923",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.823",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://ffmpeg.org/trac/ffmpeg/ticket/780"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://ffmpeg.org/trac/ffmpeg/ticket/780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c509f4f74713b035a06f79cb4d00e708f5226bc5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-04 08:29
Modified
2024-11-21 03:17
Summary
The h264_slice_init function in libavcodec/h264_slice.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The h264_slice_init function in libavcodec/h264_slice.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n h264_slice_init en libavcodec/h264_slice.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n y cierre inesperado de la aplicaci\u00f3n) mediante un archivo manipulado."
    }
  ],
  "id": "CVE-2017-17128",
  "lastModified": "2024-11-21T03:17:32.347",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-04T08:29:00.733",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1104"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-28 19:15
Modified
2024-11-21 04:26
Summary
In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c.
Impacted products
Vendor Product Version
libav libav 12.3
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c."
    },
    {
      "lang": "es",
      "value": "En Libav versi\u00f3n 12.3, se presenta un bucle infinito en la funci\u00f3n wv_read_block_header() en el archivo wvdec.c."
    }
  ],
  "id": "CVE-2019-14372",
  "lastModified": "2024-11-21T04:26:37.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-28T19:15:11.140",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1165"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and "out of array writes."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.5.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1705-1
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.5.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1705-1
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and \"out of array writes.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en libavcodec/avs.c en FFmpeg antes de v0.11 tiene un impacto desconocido y vectores de ataque, en relaci\u00f3n a las dimensiones y \"escrituras fuera de la matriz\""
    }
  ],
  "id": "CVE-2012-2801",
  "lastModified": "2024-11-21T01:39:39.777",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.210",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:31
Severity ?
Summary
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n avpriv_dv_produce_packet en libavcodec de FFmpeg v0.7.x antes de v0.7.12 y y v0.8.x antes de v0.8.11 en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.5 y v0.8.x antes de v0.8.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferencia a puntero NULL y ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo DV modificado.\r\n"
    }
  ],
  "id": "CVE-2011-3929",
  "lastModified": "2024-11-21T01:31:33.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:01.620",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=5a396bb3a66a61a68b80f2369d0249729bf85e04"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=5a396bb3a66a61a68b80f2369d0249729bf85e04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-06-06 14:55
Modified
2024-11-21 02:09
Severity ?
Summary
Multiple unspecified vulnerabilities in Libav before 0.8.12 allow remote attackers to have unknown impact and vectors.
Impacted products
Vendor Product Version
libav libav *
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
libav libav 0.8.5
libav libav 0.8.6
libav libav 0.8.7
libav libav 0.8.8
libav libav 0.8.9
libav libav 0.8.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD9CA19-5874-49D8-9DCC-72630829A8A0",
              "versionEndIncluding": "0.8.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D440FB2-C357-45B9-A4BA-B4AE8444ACC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E89124C-D0DE-494E-A86E-C8D5A60808E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BFC27A-684F-4605-9272-6065CDD57098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "03543D1E-1601-4343-A9BA-19CAAFB34293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1078353-5E19-4470-8920-E7516D7F83D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DFDAE74-395A-46FB-AC3E-23B4B564C409",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Libav before 0.8.12 allow remote attackers to have unknown impact and vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Libav anterior a 0.8.12 permiten a atacantes remotos tener impacto y vectores desconocidos."
    }
  ],
  "id": "CVE-2014-3984",
  "lastModified": "2024-11-21T02:09:16.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-06T14:55:05.790",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/news.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/59032"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/59045"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2014/dsa-2947"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2244-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2244-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-10 02:29
Modified
2024-11-21 04:00
Summary
In Libav 12.3, there is a floating point exception in the range_decode_culshift function (called from range_decode_bits) in libavcodec/apedec.c that will lead to remote denial of service via crafted input.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1141Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1141Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is a floating point exception in the range_decode_culshift function (called from range_decode_bits) in libavcodec/apedec.c that will lead to remote denial of service via crafted input."
    },
    {
      "lang": "es",
      "value": "En Libav 12.3, hay una excepci\u00f3n de punto flotante en la funci\u00f3n range_decode_culshift (llamada desde range_decode_bits) en libavcodec/apedec.c que conducir\u00e1 a una denegaci\u00f3n de servicio (DoS) remota mediante entradas manipuladas."
    }
  ],
  "id": "CVE-2018-20001",
  "lastModified": "2024-11-21T04:00:43.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-10T02:29:00.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1141"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-08-23 22:15
Modified
2024-11-21 05:08
Summary
In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
    },
    {
      "lang": "es",
      "value": "En Libav versi\u00f3n 12.3, se presenta una lectura excesiva del b\u00fafer en la regi\u00f3n heap de la memoria en la funci\u00f3n vc1_decode_b_mb_intfi en el archivo vc1_block.c, que permite a un atacante causar una denegaci\u00f3n de servicio por medio de un archivo dise\u00f1ado."
    }
  ],
  "id": "CVE-2020-18775",
  "lastModified": "2024-11-21T05:08:48.863",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-23T22:15:28.107",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1152"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description"
      ],
      "url": "https://cwe.mitre.org/data/definitions/126.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description"
      ],
      "url": "https://cwe.mitre.org/data/definitions/126.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-30 06:29
Modified
2024-11-21 03:56
Summary
There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There exists a heap-based buffer over-read in ff_vc1_pred_dc in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
    },
    {
      "lang": "es",
      "value": "Existe una sobrelectura de b\u00fafer basada en memoria din\u00e1mica (heap) en ff_vc1_pred_dc en vc1_block.c en Libav 12.3 que puede permitir que los atacantes provoquen una denegaci\u00f3n de servicio (DoS) mediante un archivo aac manipulado."
    }
  ],
  "id": "CVE-2018-18827",
  "lastModified": "2024-11-21T03:56:41.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-30T06:29:00.577",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
libavcodec/x86/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libavcodec/x86/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "libavcodec/x86/mpegvideo.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un archivo manipulado. ."
    }
  ],
  "id": "CVE-2016-9823",
  "lastModified": "2024-11-21T03:01:48.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.523",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 19:59
Modified
2024-11-21 02:56
Summary
Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7F2BA9F-2784-490A-9765-116F49A4BC90",
              "versionEndIncluding": "11.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n ff_audio_resample en resample.c en libav en versiones anteriores a 11.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores relacionados con redimensionamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2016-6832",
  "lastModified": "2024-11-21T02:56:55.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T19:59:00.360",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/13/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/18/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=825"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=0ac8ff618c5e6d878c547a8877e714ed728950ce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/13/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/18/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=0ac8ff618c5e6d878c547a8877e714ed728950ce"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-23 19:29
Modified
2024-11-21 03:19
Summary
The av_audio_fifo_size function in libavutil/audio_fifo.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted media file.
References
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The av_audio_fifo_size function in libavutil/audio_fifo.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted media file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n av_audio_fifo_size en libavutil/audio_fifo.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desreferencia de puntero NULL) mediante un archivo multimedia manipulado."
    }
  ],
  "id": "CVE-2017-18247",
  "lastModified": "2024-11-21T03:19:40.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-23T19:29:00.637",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1089"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-09 11:29
Modified
2024-11-21 03:57
Summary
In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file.
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file."
    },
    {
      "lang": "es",
      "value": "En Libav 12.3, hay una sobrelectura de b\u00fafer basada en memoria din\u00e1mica (heap) en decode_frame en libavcodec/lcldec.c que permite que un atacante provoque una denegaci\u00f3n de servicio (DoS) mediante un archivo avi manipulado."
    }
  ],
  "id": "CVE-2018-19128",
  "lastModified": "2024-11-21T03:57:22.910",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-09T11:29:03.737",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1137"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing with frame threading."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing with frame threading.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n ff_rv34_decode_frame en libavcodec/rv34.c en FFmpeg anterior a v0.11 tiene un impacto desconocido y vectores de ataque, relacionado con \"width/height cambiando con el marco threading\"."
    }
  ],
  "id": "CVE-2012-2772",
  "lastModified": "2024-11-21T01:39:36.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.023",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "number of output channels" and "out of array writes."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.5.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1705-1
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.5.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1705-1
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the \"number of output channels\" and \"out of array writes.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n ac3_decode_frame en libavcodec/ac3dec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con el \"n\u00famero de canales de salida\" y una \"escritura fuera de array\".\r\n"
    }
  ],
  "id": "CVE-2012-2802",
  "lastModified": "2024-11-21T01:39:39.927",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.243",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-12-12 11:38
Modified
2024-11-21 01:44
Severity ?
Summary
Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN."
Impacted products
Vendor Product Version
canonical ubuntu_linux 11.10
canonical ubuntu_linux 12.04
canonical ubuntu_linux 12.10
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
google chrome *
google chrome 23.0.1271.0
google chrome 23.0.1271.1
google chrome 23.0.1271.2
google chrome 23.0.1271.3
google chrome 23.0.1271.4
google chrome 23.0.1271.5
google chrome 23.0.1271.6
google chrome 23.0.1271.7
google chrome 23.0.1271.8
google chrome 23.0.1271.9
google chrome 23.0.1271.10
google chrome 23.0.1271.11
google chrome 23.0.1271.12
google chrome 23.0.1271.13
google chrome 23.0.1271.14
google chrome 23.0.1271.15
google chrome 23.0.1271.16
google chrome 23.0.1271.17
google chrome 23.0.1271.18
google chrome 23.0.1271.19
google chrome 23.0.1271.20
google chrome 23.0.1271.21
google chrome 23.0.1271.22
google chrome 23.0.1271.23
google chrome 23.0.1271.24
google chrome 23.0.1271.26
google chrome 23.0.1271.30
google chrome 23.0.1271.31
google chrome 23.0.1271.32
google chrome 23.0.1271.33
google chrome 23.0.1271.35
google chrome 23.0.1271.36
google chrome 23.0.1271.37
google chrome 23.0.1271.38
google chrome 23.0.1271.39
google chrome 23.0.1271.40
google chrome 23.0.1271.41
google chrome 23.0.1271.44
google chrome 23.0.1271.45
google chrome 23.0.1271.46
google chrome 23.0.1271.49
google chrome 23.0.1271.50
google chrome 23.0.1271.51
google chrome 23.0.1271.52
google chrome 23.0.1271.53
google chrome 23.0.1271.54
google chrome 23.0.1271.55
google chrome 23.0.1271.56
google chrome 23.0.1271.57
google chrome 23.0.1271.58
google chrome 23.0.1271.59
google chrome 23.0.1271.60
google chrome 23.0.1271.61
google chrome 23.0.1271.62
google chrome 23.0.1271.64
google chrome 23.0.1271.83
google chrome 23.0.1271.84
google chrome 23.0.1271.85
google chrome 23.0.1271.86
google chrome 23.0.1271.87
google chrome 23.0.1271.88
google chrome 23.0.1271.89
google chrome 23.0.1271.91
google chrome 23.0.1271.92
google chrome 23.0.1271.93
google chrome 23.0.1271.94
google chrome 23.0.1271.95
opensuse opensuse 12.1
opensuse opensuse 12.2
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC91B3BC-398F-4626-BF34-91FB3E86F334",
              "versionEndIncluding": "23.0.1271.96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "0951860F-83CD-47A7-951F-2C93A53E9098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D41B4E-275D-4CAE-8165-31EA30DB8B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9EFE67-FA32-448B-B10A-D68EE04D2E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB7CD1B-5FD0-4BE5-9056-35A380BFF087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F73AE2-B1F5-47B7-AEEA-A2810833D8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "679A878A-0934-4D3C-BC2F-C6FE334D590F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB90E306-4BA6-473B-B39F-ED4DB7B2D724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E517092-8323-41D2-A779-251F60B0B53C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C17385-233B-472C-864D-DFC3EAE357AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "64677E1B-B3E8-4EA7-990B-63F17D9792B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E87B7DF-308C-4FDD-BF9E-92949FEC8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B3EB67-52DD-495E-850D-9471536671EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4F93D0-ECBA-481A-B278-EB907791904C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B6B82F-AB97-4C7A-BCF9-4680E65DB4E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to \"an off-by-one overwrite when switching to LTP profile from MAIN.\""
    },
    {
      "lang": "es",
      "value": "Google Chrome antes 23.0.1271.97 no realiza correctamente la decodificaci\u00f3n AAC, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de pila de memoria) o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-5144",
  "lastModified": "2024-11-21T01:44:08.300",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-12-12T11:38:44.810",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=161639"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=161639"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being "large enough."
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being \"large enough.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n decode_frame_mp3on4 en libavcodec/mpegaudiodec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos relacionados con un c\u00e1lculo que impide que un marco se \"suficientemente grande\"."
    }
  ],
  "id": "CVE-2012-2797",
  "lastModified": "2024-11-21T01:39:39.233",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.023",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cca9528524c7a4b91451f4322bd50849af5d057e"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cca9528524c7a4b91451f4322bd50849af5d057e"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-19 21:15
Modified
2024-11-21 04:52
Summary
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because “no evidence of a vulnerability is provided” and only “a generic warning from a static code analysis” is provided
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D267B7-CF5C-4C69-9E61-2F793B918C82",
              "versionEndIncluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. NOTE: Third parties dispute that this is a vulnerability because \u201cno evidence of a vulnerability is provided\u201d and only \u201ca generic warning from a static code analysis\u201d is provided"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** Un desbordamiento de b\u00fafer basado en pila en el decodificador de subt\u00edtulos en Libav 12.3 permite a los atacantes corromper la pila a trav\u00e9s de un archivo de video especialmente dise\u00f1ado en formato Matroska, porque srt_to_ass en libavcodec / srtdec.c usa mal snprintf. NOTA: Los terceros discuten que esto es una vulnerabilidad porque \"no se proporciona evidencia de una vulnerabilidad\" y solo se proporciona \"una advertencia gen\u00e9rica de un an\u00e1lisis de c\u00f3digo est\u00e1tico\"."
    }
  ],
  "id": "CVE-2019-9719",
  "lastModified": "2024-11-21T04:52:10.293",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-19T21:15:10.503",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/commits/master/libavcodec/srtdec.c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/projects/g/libav/libav/snapshot/f5f553ca3bdca0c97dd08bbf002f0d8cb193788b/files/libavcodec/srtdec.c?sort=name\u0026dir=ASC\u0026mode=heatmap#xeec693aa6d85853b:1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value.
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.5.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1705-1
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1706-1
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.5.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1705-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1706-1
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de doble liberaci\u00f3n en la funci\u00f3n mpeg_decode_frame de libavcodec/mpeg12.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con el cambio del valor del tama\u00f1o de los datos\r\n"
    }
  ],
  "id": "CVE-2012-2803",
  "lastModified": "2024-11-21T01:39:40.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:04.287",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1706-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1706-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array read" when a "packet is shrunk."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an \"out of array read\" when a \"packet is shrunk.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n avi_read_packet en libavformat/avidec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con una lectura fuera de limites de una matriz\" cuando \"un paquete es reducido\".\r\n"
    }
  ],
  "id": "CVE-2012-2788",
  "lastModified": "2024-11-21T01:39:38.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.617",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-01-03 20:29
Modified
2024-11-21 03:04
Summary
In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(&gb) is called on an uninitialized get_bits context, which causes a NULL deref exception.
Impacted products
Vendor Product Version
libav libav 13_dev0
ffmpeg ffmpeg 3.4
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:13_dev0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3C7FE1-23F0-4FB6-BDE7-1229B529D1DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BFDA7F5-FE3F-4D4A-AE46-43251194C127",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6487496-0D7D-47A1-9E6D-9D850A15B7E6",
              "versionEndIncluding": "56.0.2924",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In line libavcodec/h264dec.c:500 in libav(v13_dev0), ffmpeg(n3.4), chromium(56 prior Feb 13, 2017), the return value of init_get_bits is ignored and get_ue_golomb(\u0026gb) is called on an uninitialized get_bits context, which causes a NULL deref exception."
    },
    {
      "lang": "es",
      "value": "En la l\u00ednea libavcodec/h264dec.c:500 en libav (v13_dev0), ffmpeg (n3.4) y chromium (56 anterior al 13 de febrero de 2017), el valor de retorno de init_get_bits se ignora y se llama a get_ue_golomb (gb) en un contexto get_bits no inicializado. Esto desemboca en una excepci\u00f3n NULL deref."
    }
  ],
  "id": "CVE-2017-1000460",
  "lastModified": "2024-11-21T03:04:46.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-03T20:29:00.220",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=952"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/8e313ca08800178efce00045e07dc494d437b70c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://lists.ffmpeg.org/pipermail/ffmpeg-cvslog/2017-January/104221.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid "gop header" and decoding in a "half initialized context."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid \"gop header\" and decoding in a \"half initialized context.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n decode_frame en libavcodec/indeo5.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con un \"encabezado GOP inv\u00e1lido\" y la decodificaci\u00f3n en un \"contexto medio-inicializado.\"\r\n"
    }
  ],
  "id": "CVE-2012-2779",
  "lastModified": "2024-11-21T01:39:36.927",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.303",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-13 17:29
Modified
2024-11-21 03:17
Summary
In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream.
Impacted products
Vendor Product Version
libav libav *
libav libav 12.0
libav libav 12.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64C7955-5796-4434-8FC0-4486FE1E2AB5",
              "versionEndIncluding": "11.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26A9134-C152-46A4-83AB-F61EF54A69B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99846C93-A0F8-459D-AC79-A79CDE487505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream."
    },
    {
      "lang": "es",
      "value": "En Libav hasta la versi\u00f3n 11.11 y las versiones 12.x hasta la 12.1, la funci\u00f3n smacker_decode_tree en libavcodec/smacker.c no restringe correctamente la recursi\u00f3n de \u00e1rbol, lo que permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites de bitstream.c:build_table() y cierre inesperado de la aplicaci\u00f3n) mediante una transmisi\u00f3n Smacker manipulada."
    }
  ],
  "id": "CVE-2017-16803",
  "lastModified": "2024-11-21T03:17:00.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-13T17:29:00.567",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101882"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1098"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201811-19"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2018/dsa-4119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201811-19"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2018/dsa-4119"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-22 21:29
Modified
2024-11-21 03:19
Summary
The unpack_parse_unit function in libavcodec/dirac_parser.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault) via a crafted file.
References
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The unpack_parse_unit function in libavcodec/dirac_parser.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault) via a crafted file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n unpack_parse_unit en libavcodec/dirac_parser.c en Libav 12.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) utilizando un archivo manipulado."
    }
  ],
  "id": "CVE-2017-18243",
  "lastModified": "2024-11-21T03:19:39.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-22T21:29:00.383",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1088"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in "coded slice positions and interlacing" that trigger "out of array writes."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in \"coded slice positions and interlacing\" that trigger \"out of array writes.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n vc1_decode_frame en libavcodec/vc1dec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con inconsistencias en las \"posiciones y entrelazado de tramas codificadas\" que se ocasionan una \"escritura fuera de array\".\r\n"
    }
  ],
  "id": "CVE-2012-2796",
  "lastModified": "2024-11-21T01:39:39.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.977",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-04 08:29
Modified
2024-11-21 03:17
Summary
The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n vc1_decode_frame en libavcodec/vc1dec.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desreferencia de puntero NULL y cierre inesperado de la aplicaci\u00f3n) mediante un archivo manipulado."
    }
  ],
  "id": "CVE-2017-17127",
  "lastModified": "2024-11-21T03:17:32.200",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-04T08:29:00.700",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1099"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-07-07 21:55
Modified
2024-11-21 01:27
Severity ?
Summary
sp5xdec.c in the Sunplus SP5X JPEG decoder in libavcodec in FFmpeg before 0.6.3 and libav through 0.6.2, as used in VideoLAN VLC media player 1.1.9 and earlier and other products, performs a write operation outside the bounds of an unspecified array, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed AMV file.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg libavcodec *
libav libav *
libav libav 0.3
libav libav 0.3.1
libav libav 0.3.2
libav libav 0.3.3
libav libav 0.3.4
libav libav 0.4.0
libav libav 0.4.1
libav libav 0.4.2
libav libav 0.4.3
libav libav 0.4.4
libav libav 0.4.5
libav libav 0.4.6
libav libav 0.4.7
libav libav 0.4.8
libav libav 0.4.9
libav libav 0.5
libav libav 0.5.4
libav libav 0.6
libav libav 0.6.1
videolan vlc_media_player *
videolan vlc_media_player 0.1.99b
videolan vlc_media_player 0.1.99e
videolan vlc_media_player 0.1.99f
videolan vlc_media_player 0.1.99g
videolan vlc_media_player 0.1.99h
videolan vlc_media_player 0.1.99i
videolan vlc_media_player 0.2.0
videolan vlc_media_player 0.2.60
videolan vlc_media_player 0.2.61
videolan vlc_media_player 0.2.62
videolan vlc_media_player 0.2.63
videolan vlc_media_player 0.2.70
videolan vlc_media_player 0.2.71
videolan vlc_media_player 0.2.72
videolan vlc_media_player 0.2.73
videolan vlc_media_player 0.2.80
videolan vlc_media_player 0.2.81
videolan vlc_media_player 0.2.82
videolan vlc_media_player 0.2.83
videolan vlc_media_player 0.2.90
videolan vlc_media_player 0.2.91
videolan vlc_media_player 0.2.92
videolan vlc_media_player 0.3.0
videolan vlc_media_player 0.3.1
videolan vlc_media_player 0.4.0
videolan vlc_media_player 0.4.1
videolan vlc_media_player 0.4.2
videolan vlc_media_player 0.4.3
videolan vlc_media_player 0.4.4
videolan vlc_media_player 0.4.5
videolan vlc_media_player 0.4.6
videolan vlc_media_player 0.5.0
videolan vlc_media_player 0.5.1
videolan vlc_media_player 0.5.2
videolan vlc_media_player 0.5.3
videolan vlc_media_player 0.6.0
videolan vlc_media_player 0.6.1
videolan vlc_media_player 0.6.2
videolan vlc_media_player 0.7.0
videolan vlc_media_player 0.7.2
videolan vlc_media_player 0.8.0
videolan vlc_media_player 0.8.1
videolan vlc_media_player 0.8.2
videolan vlc_media_player 0.8.4
videolan vlc_media_player 0.8.5
videolan vlc_media_player 0.8.6
videolan vlc_media_player 0.9.2
videolan vlc_media_player 0.9.3
videolan vlc_media_player 0.9.4
videolan vlc_media_player 0.9.5
videolan vlc_media_player 0.9.6
videolan vlc_media_player 0.9.8a
videolan vlc_media_player 0.9.9
videolan vlc_media_player 0.9.10
videolan vlc_media_player 1.0.0
videolan vlc_media_player 1.0.1
videolan vlc_media_player 1.0.2
videolan vlc_media_player 1.0.3
videolan vlc_media_player 1.0.4
videolan vlc_media_player 1.0.5
videolan vlc_media_player 1.0.6
videolan vlc_media_player 1.1.0
videolan vlc_media_player 1.1.1
videolan vlc_media_player 1.1.2
videolan vlc_media_player 1.1.3
videolan vlc_media_player 1.1.4
videolan vlc_media_player 1.1.4.1
videolan vlc_media_player 1.1.5
videolan vlc_media_player 1.1.6
videolan vlc_media_player 1.1.7
videolan vlc_media_player 1.1.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B371E4-1DC2-421C-97C3-0C7D63634431",
              "versionEndIncluding": "0.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:libavcodec:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA07753-777E-469D-BBBA-E300C8FDE9D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B022E537-0A57-4F9A-941E-DA10CFF0FC0B",
              "versionEndIncluding": "0.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB86B78D-837D-481F-A6E8-F48501E08D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5056E88C-1F9D-4138-A291-D28CB6766D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D7B815-46FE-4EB6-A922-5B174B74F4D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ECC4210-D6A3-4ECC-A042-2107FD655A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EE1D87-553D-4EA6-BFA7-58CBA7819A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDE9C28-FCF7-4CF8-A657-780F18769980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1607C08-0CAD-4148-9F0E-74E53D364156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B957D8F4-F012-4FF5-87B5-3D31936004DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9344E3-FBB0-4777-889A-D40438C3C560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D53D47A-8946-4EB3-8A2B-4A87E0AADD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F28C3ED-FE8A-4404-9CD7-9119373C6EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B473F20B-FE7F-4AB4-86AB-BE50E68A1E55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E0C3E3-7935-4569-B086-9C1CA048EE68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EBAC6A-AAD3-4F7F-8500-C98EB2BD4468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "38A1F1CF-56FD-46C4-AABA-AA72648D7863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "790E5A3C-CDBA-46B9-8C77-3C3905BC0760",
              "versionEndIncluding": "1.1.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A23C59-433E-467A-9FDD-7D18CC1AC0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E2E373-13F6-405D-8866-ECADE118C2F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9447EA-6F39-4B10-A0E1-C094CF3E1BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D2A6B8-B75C-42B5-962F-28DB013D65E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA4C098-F2B1-496E-B872-90774C7D105C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C2006D-FA5A-4002-B81B-54FC35B46DB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8DE917-7328-4D01-9736-0567963F4D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8197F279-8411-4E9A-9840-BCC625D636C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F7AF897-3B0C-4CA0-86C7-93C9AA26CD0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B2C78E-8399-404C-97E5-CDAB93587757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D6BE69-725A-4CE1-BD42-D3FA10126BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CC1414B-3733-4B29-AC06-E6788E29C7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBDEEC2D-8ACD-4C6B-944A-F0952498E511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC59E17-D647-4F91-B9B7-D9949921DFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC4F928-FD5D-4C11-BF39-B068A5630DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "398EC30A-ABC6-4474-9516-63769F71E8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "86EB8260-DCAA-4261-BFF7-8FE3628CE13E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "F37BDFCB-3171-44A6-8F0A-0FCCCA876801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A26CC61-7D20-4F99-A774-C5FF4AD1F249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "069BA9C0-7B3F-4B6D-B433-2D618F826438",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B04A969-0645-41D4-AEA4-9AC47725F593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "984C1ABC-B155-417A-AA0E-78B13A263650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3913F6C0-22E2-4FFC-AFF6-417F286C36F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "205B275E-1E9E-4558-BD8B-1B3E3B349886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA909414-DA30-4DAD-A342-3588B0840251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "028CDDD1-BFB7-438F-811D-7549713F45E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "97B959F2-501C-4365-88CD-8231BF36297E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F5C7D12-3521-4398-AB5C-CBFB6A500DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEFD6C6D-05FC-437E-92B7-848C9112FD42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C45418-8946-4DFE-8D78-CBE3432600BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5F3996-3AE2-4690-84A5-F258BC07596E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12602EC1-07DE-4A40-9897-E7E6A23D4B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6726FF43-2330-444C-86F0-FB774F8470C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D485D0-BBF8-4A0F-91A1-52835EF876A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC23A94C-3611-41BA-9043-22C477B8020B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "01118457-9068-48F7-B2A4-BABB354E1449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB851F73-D444-4316-9AA0-4556068ADED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6221A983-B4AC-4646-A939-FAA021EE7F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1707178-C378-4098-8C97-CBFB5DD8B4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46904EED-974A-4900-B676-DE298CB3ADE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4384C436-12AF-4051-B074-893BE6B4C7F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EC2CEE6-A2E1-437A-947F-608EB7987758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30A98A2-675A-4913-A425-2B9F8F06CEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A360E5-501E-4A97-94A0-620FC5B2627A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2845107-7D0C-4F72-AF0C-0E059E923826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B68706-5A1F-479F-8A38-F93D98481F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B32073-DBD5-4344-8498-A132B99807A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5330E5C4-BF18-498A-9AE2-1C57E2494AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D31A16-94EE-45D6-8C54-4F27D466A29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "117C896C-1C61-440E-B0F4-A871828CD095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "53C17E1A-2E3A-4765-92DE-55CFEE5E4CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A218DA63-4334-4C9F-BB47-44CC00630613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD809FD-E893-4921-83CE-D34008670F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F60ACBF-E7C6-4184-9B91-8ED3840A7BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1925D17-564A-4D8C-87FB-D3C731FA0612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BD6170-AD0D-4E95-8998-8B5CE8F0E3AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B06DCD7-56C5-4B25-936E-07D766109FB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "29AD31C5-B119-44EF-8627-2C480860BAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "692C36B2-2A55-44EA-B80E-D7EDE384BA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEAD1ED9-4FA1-47D9-87A0-9D6B4C6771DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E2A762-C13C-4BDD-AD86-7A52609D693D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0042DAC1-A91B-40A6-A379-9C345CF13E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D13741F-8A82-44F6-8D73-98451A180529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C6189-71F1-4A3A-BC08-94087AE1FCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "591C6696-07C0-463A-B986-AD4FA6985AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8342E310-43DE-46C0-85D9-E1D1F9F554E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAFBBE61-2E34-4CD2-96D2-89A85E66C9AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74E71F3-984E-4CF3-900A-F80E7103D3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8596527-4778-4CCD-ABBB-90CA434D91E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF8ED57-EE37-4B1D-B094-B3CA22E45127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E42A1C4B-91EE-417B-A254-9D0E93FCF3B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sp5xdec.c in the Sunplus SP5X JPEG decoder in libavcodec in FFmpeg before 0.6.3 and libav through 0.6.2, as used in VideoLAN VLC media player 1.1.9 and earlier and other products, performs a write operation outside the bounds of an unspecified array, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed AMV file."
    },
    {
      "lang": "es",
      "value": "sp5xdec.c en el decodificador Sunplus SP5X JPEG  en libavcodec en FFmpeg antes de v0.6.3 y libav hasta v0.6.2, tal y como se utiliza en VideoLAN VLC media player v1.1.9 y versiones anteriores y otros productos, realiza una operaci\u00f3n de escritura fuera de los l\u00edmites permitidos de un array no especificado, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo AMV mal formado."
    }
  ],
  "id": "CVE-2011-1931",
  "lastModified": "2024-11-21T01:27:20.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-07-07T21:55:02.087",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/8299"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/517706"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/47602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f903b3d5ec38c9c5d90fba7e626fa0eda61a32"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/517706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47602"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-19 21:15
Modified
2024-11-21 04:52
Summary
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D267B7-CF5C-4C69-9E61-2F793B918C82",
              "versionEndIncluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf."
    },
    {
      "lang": "es",
      "value": "En Libav versi\u00f3n 12.3, una denegaci\u00f3n de servicio en el decodificador de subt\u00edtulos permite a atacantes acaparar la CPU por medio de un archivo de video dise\u00f1ado en formato Matroska, porque la funci\u00f3n srt_to_ass en el archivo libavcodec/srtdec.c tiene un argumento de formato complejo para sscanf."
    }
  ],
  "id": "CVE-2019-9717",
  "lastModified": "2024-11-21T04:52:09.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-19T21:15:10.440",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-04 08:29
Modified
2024-11-21 03:17
Summary
The ff_vc1_mc_4mv_chroma4 function in libavcodec/vc1_mc.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) or possibly have unspecified other impact via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_vc1_mc_4mv_chroma4 function in libavcodec/vc1_mc.c in Libav 12.2 allows remote attackers to cause a denial of service (segmentation fault and application crash) or possibly have unspecified other impact via a crafted file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_vc1_mc_4mv_chroma4 en libavcodec/vc1_mc.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n y cierre inesperado de la aplicaci\u00f3n) o, posiblemente, causen otro impacto sin especificar mediante un archivo manipulado."
    }
  ],
  "id": "CVE-2017-17129",
  "lastModified": "2024-11-21T03:17:32.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-04T08:29:00.763",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1101"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an \"out of array write in quant_cof.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en la funci\u00f3n read_var_block_data en libavcodec/alsdec.c en FFmpeg antes de v0.11 tiene un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con un pedido grande y una \"escritura fuera de matriz en quant_cof\".\r\n"
    }
  ],
  "id": "CVE-2012-2775",
  "lastModified": "2024-11-21T01:39:36.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.117",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the "transform size."
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
libav libav 0.8.4
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF6BD45-4143-4A45-B7AB-E3428A8BFB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the \"transform size.\""
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en las funciones (1) decode_band_hdr indeo4.c y (2) ivi_common.c ff_ivi_decode_blocks en ivi_common.c in libavcodec in FFmpeg antes de v0.11 tienen un impacto y vectores de ataque desconocidos. Se trata de un problema relacionado con el \"tama\u00f1o de transformaci\u00f3n\".\r\n"
    }
  ],
  "id": "CVE-2012-2791",
  "lastModified": "2024-11-21T01:39:38.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.743",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=0846719dd11ab3f7a7caee13e7af71f71d913389"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=0846719dd11ab3f7a7caee13e7af71f71d913389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1705-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-01-14 02:29
Modified
2024-11-21 04:09
Summary
In Libav through 12.2, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1110Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1110Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26FBC73-EA2B-4DA4-915B-CCAC8DCB9E55",
              "versionEndIncluding": "12.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav through 12.2, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file."
    },
    {
      "lang": "es",
      "value": "En Libav 12.1, hay una llamada memcpy no v\u00e1lida en la funci\u00f3n ff_mov_read_stsd_entries de libavformat/mov.c. Los atacantes remotos pueden aprovechar esta vulnerabilidad para provocar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) y el fallo del programa mediante un archivo avi manipulado."
    }
  ],
  "id": "CVE-2018-5684",
  "lastModified": "2024-11-21T04:09:09.697",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-14T02:29:05.137",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1110"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2024-11-21 03:01
Summary
libswscale/utils.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
Impacted products
Vendor Product Version
libav libav 11.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13C7C73-2D64-47A9-A4BB-2D2E0DCF443D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libswscale/utils.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value."
    },
    {
      "lang": "es",
      "value": "libswscale/utils.c en libav 11.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores que implican desplazamiento a la izquierda de un valor negativo."
    }
  ],
  "id": "CVE-2016-9825",
  "lastModified": "2024-11-21T03:01:48.867",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-01T15:59:00.587",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/94732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-30 06:29
Modified
2024-11-21 03:56
Summary
There exists a NULL pointer dereference in ff_vc1_parse_frame_header_adv in vc1.c in Libav 12.3, which allows attackers to cause a denial-of-service through a crafted aac file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1136Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1136Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There exists a NULL pointer dereference in ff_vc1_parse_frame_header_adv in vc1.c in Libav 12.3, which allows attackers to cause a denial-of-service through a crafted aac file."
    },
    {
      "lang": "es",
      "value": "Existe una desreferencia de puntero NULL en ff_vc1_parse_frame_header_adv en vc1.c en Libav 12.3 que puede permitir que los atacantes provoquen una denegaci\u00f3n de servicio (DoS) mediante un archivo aac manipulado."
    }
  ],
  "id": "CVE-2018-18829",
  "lastModified": "2024-11-21T03:56:42.277",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-30T06:29:00.750",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1136"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value.
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15FD45D-03F0-4EA0-9CEB-B7E7C62478D0",
              "versionEndIncluding": "0.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_h264_decode_seq_parameter_set en h264_ps.c en libavcodec en FFmpeg antes de v0.9.1 y en Libav v0.5.x  antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6, y v0.8.x antes de v0.8.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una archivo H.264 con el valor chroma_format_idc modificado.\r\n"
    }
  ],
  "id": "CVE-2012-0851",
  "lastModified": "2024-11-21T01:35:50.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.700",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/trac/ffmpeg/ticket/758"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=7fff64e00d886fde11d61958888c82b461cf99b9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/trac/ffmpeg/ticket/758"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=7fff64e00d886fde11d61958888c82b461cf99b9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78933"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-07-27 06:29
Modified
2024-11-21 03:08
Summary
There is an illegal address access in the build_table function in libavcodec/bitstream.c of Libav 12.1 that will lead to remote denial of service via crafted input.
References
Impacted products
Vendor Product Version
libav libav 12.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99846C93-A0F8-459D-AC79-A79CDE487505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is an illegal address access in the build_table function in libavcodec/bitstream.c of Libav 12.1 that will lead to remote denial of service via crafted input."
    },
    {
      "lang": "es",
      "value": "Se presenta un acceso de direcci\u00f3n ilegal en la funci\u00f3n build_table en el archivo libavcodec/bitstream.c de Libav versi\u00f3n 12.1, que conllevar\u00e1 a la denegaci\u00f3n remota de servicio por medio de una entrada creada."
    }
  ],
  "id": "CVE-2017-11684",
  "lastModified": "2024-11-21T03:08:18.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-07-27T06:29:00.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99980"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1073"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-05-15 02:29
Modified
2024-11-21 03:42
Summary
An issue was discovered in Libav 12.3. A read access violation in the mov_probe function in libavformat/mov.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Libav 12.3. A read access violation in the mov_probe function in libavformat/mov.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto un problema en Libav 12.3. Violaci\u00f3n de acceso de lectura en la funci\u00f3n mov_probe en libavformat/mov.c permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado de la aplicaci\u00f3n), tal y como queda demostrado con avconv."
    }
  ],
  "id": "CVE-2018-11102",
  "lastModified": "2024-11-21T03:42:41.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-05-15T02:29:00.207",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1128"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-19 21:15
Modified
2024-11-21 04:52
Summary
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D267B7-CF5C-4C69-9E61-2F793B918C82",
              "versionEndIncluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en el decodificador de subt\u00edtulos en Libav versi\u00f3n 12.3, permite a atacantes corromper la pila por medio de un archivo de video dise\u00f1ado en formato Matroska, porque la funci\u00f3n srt_to_ass en el archivo libavcodec/srtdec.c utiliza inapropiadamente snprintf."
    }
  ],
  "id": "CVE-2019-9720",
  "lastModified": "2024-11-21T04:52:10.437",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-19T21:15:10.580",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lgtm.com/security/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-28 19:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Libav 12.3. There is an infinite loop in the function mov_probe in the file libavformat/mov.c, related to offset and tag.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1163Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1163Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Libav 12.3. There is an infinite loop in the function mov_probe in the file libavformat/mov.c, related to offset and tag."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en Libav versi\u00f3n 12.3. Se presenta un bucle infinito en la funci\u00f3n mov_probe en el archivo libavformat/mov.c, relacionado con un desplazamiento y una etiqueta."
    }
  ],
  "id": "CVE-2019-14371",
  "lastModified": "2024-11-21T04:26:36.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-28T19:15:11.093",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1163"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shorten codec (shorten.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Shorten file, related to an "invalid free".
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.5.6
libav libav 0.5.7
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.6.4
libav libav 0.6.5
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.8
libav libav 0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Shorten codec (shorten.c) in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Shorten file, related to an \"invalid free\"."
    },
    {
      "lang": "es",
      "value": "El codec Shorten (shorten.c) en libavcodec de FFmpeg en v0.7.x antes de v0.7.12 y v0.8.x antes de v0.8.11, y en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.5 y v0.8.x antes de v0.8.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo Shorten hecho a mano, relacionado con una \"liberaci\u00f3n inv\u00e1lida\".\r\n"
    }
  ],
  "id": "CVE-2012-0858",
  "lastModified": "2024-11-21T01:35:51.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T18:55:02.857",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=204cb29b3c84a74cbcd059d353c70c8bdc567d98"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1479-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams.
References
secalert@redhat.comhttp://ffmpeg.org/
secalert@redhat.comhttp://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86
secalert@redhat.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86
secalert@redhat.comhttp://libav.org/
secalert@redhat.comhttp://libav.org/releases/libav-0.5.6.changelog
secalert@redhat.comhttp://libav.org/releases/libav-0.6.4.changelog
secalert@redhat.comhttp://libav.org/releases/libav-0.7.3.changelog
secalert@redhat.comhttp://ubuntu.com/usn/usn-1320-1
secalert@redhat.comhttp://ubuntu.com/usn/usn-1333-1
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:074
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:075
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:076
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/
af854a3a-2127-422b-91ae-364da2661108http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86
af854a3a-2127-422b-91ae-364da2661108http://libav.org/
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.5.6.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.6.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.3.changelog
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1320-1
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1333-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:074
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:075
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:076
Impacted products
Vendor Product Version
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.5
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "32A152D9-947E-4198-9C2D-2A582F09AB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en el decodificador Sierra VMD en libavcodec en FFmpeg v0.5.x anterior a v0.5.7, v0.6.x anterior a v0.6.4, v0.7.x anterior a v0.7.9 y v0.8.x anterior a  v0.8.8; y en Libav v0.5.x anterior a v0.5.6, v0.6.x anterior a v0.6.4, y 0.7.x anterior a v0.7.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de un fichero VMD manipulado, relacionado con (streams) corruptos."
    }
  ],
  "id": "CVE-2011-4364",
  "lastModified": "2024-11-21T01:32:18.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T20:55:02.957",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c0cbe36b18ab3eb13a53fe684ec1f63a00df2c86"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to "too many zeros."
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to \"too many zeros.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n lag_decode_zero_run_line en libavcodec/lagarith.c en FFmpeg antes de v0.11 tiene un impacto  y vectores de ataque cesconocidos desconocidos relacionados con \"muchos ceros\""
    }
  ],
  "id": "CVE-2012-2793",
  "lastModified": "2024-11-21T01:39:38.697",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.837",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-08-23 22:15
Modified
2024-11-21 05:08
Summary
In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
    },
    {
      "lang": "es",
      "value": "En Libav versi\u00f3n 12.3, se presenta una lectura excesiva del b\u00fafer en la regi\u00f3n heap de la memoria en la funci\u00f3n vc1_decode_p_mb_intfi en el archivo vc1_block.c, que permite a un atacante causar una denegaci\u00f3n de servicio por medio de un archivo dise\u00f1ado."
    }
  ],
  "id": "CVE-2020-18778",
  "lastModified": "2024-11-21T05:08:49.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-23T22:15:28.487",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1155"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description"
      ],
      "url": "https://cwe.mitre.org/data/definitions/126.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description"
      ],
      "url": "https://cwe.mitre.org/data/definitions/126.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-30 06:29
Modified
2024-11-21 03:56
Summary
There exists a heap-based buffer overflow in vc1_decode_i_block_adv in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1135Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There exists a heap-based buffer overflow in vc1_decode_i_block_adv in vc1_block.c in Libav 12.3, which allows attackers to cause a denial-of-service via a crafted aac file."
    },
    {
      "lang": "es",
      "value": "Existe un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en vc1_decode_i_block_adv en vc1_block.c en Libav 12.3 que puede permitir que los atacantes provoquen una denegaci\u00f3n de servicio (DoS) mediante un archivo aac manipulado."
    }
  ],
  "id": "CVE-2018-18828",
  "lastModified": "2024-11-21T03:56:42.123",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-30T06:29:00.657",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1135"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-23 19:29
Modified
2024-11-21 03:19
Summary
The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file.
References
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3npcm_encode_frame en libavcodec/pcm.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (sobrelectura de b\u00fafer basada en memoria din\u00e1mica o heap) mediante un archivo multimedia manipulado."
    }
  ],
  "id": "CVE-2017-18246",
  "lastModified": "2024-11-21T03:19:40.400",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-23T19:29:00.573",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1095"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1095"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-08-23 22:15
Modified
2024-11-21 05:08
Summary
In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1153Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1153Exploit, Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file."
    },
    {
      "lang": "es",
      "value": "En Libav versi\u00f3n 12.3, se presenta un fallo de segmentaci\u00f3n en la funci\u00f3n vc1_decode_b_mb_intfr en el archivo vc1_block.c que permite a un atacante provocar una denegaci\u00f3n de servicio por medio de un archivo dise\u00f1ado."
    }
  ],
  "id": "CVE-2020-18776",
  "lastModified": "2024-11-21T05:08:49.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-23T22:15:28.370",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1153"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-22 21:29
Modified
2024-11-21 03:19
Summary
The stereo_processing function in libavcodec/aacps.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file, related to ff_ps_apply.
References
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The stereo_processing function in libavcodec/aacps.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file, related to ff_ps_apply."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n stereo_processing en libavcodec/aacps.c en Libav 12.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) utilizando un archivo aac manipulado. Esto se relaciona con ff_ps_apply."
    }
  ],
  "id": "CVE-2017-18244",
  "lastModified": "2024-11-21T03:19:40.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-22T21:29:00.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1105"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-23 19:29
Modified
2024-11-21 03:19
Summary
The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file.
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n mpc8_probe en libavformat/mpc8.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (sobrelectura de b\u00fafer basada en memoria din\u00e1mica o heap) mediante un archivo de audio manipulado."
    }
  ],
  "id": "CVE-2017-18245",
  "lastModified": "2024-11-21T03:19:40.250",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-23T19:29:00.510",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1094"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 21:59
Modified
2024-11-21 02:58
Summary
The sbr_make_f_master function in aacsbr.c in Libav 11.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file.
Impacted products
Vendor Product Version
libav libav 11.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35351CFD-65C7-42A0-9B40-0D1D7009477C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The sbr_make_f_master function in aacsbr.c in Libav 11.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n sbr_make_f_master en aacsbr.c en Libav 11.7 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error de divisi\u00f3n por cero y bloqueo de aplicaci\u00f3n) a trav\u00e9s de un archivo mp3 manipulado."
    }
  ],
  "id": "CVE-2016-7499",
  "lastModified": "2024-11-21T02:58:06.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T21:59:00.260",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93102"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=blobdiff%3Bf=libavcodec/aacsbr.c%3Bh=7d156e525b40b197c38db17acf16730845b91e56%3Bhp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e%3Bhb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52%3Bhpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=blobdiff%3Bf=libavcodec/aacsbr.c%3Bh=7d156e525b40b197c38db17acf16730845b91e56%3Bhp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e%3Bhb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52%3Bhpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-369"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-30 13:15
Modified
2024-11-21 04:26
Summary
In mpc8_read_header in libavformat/mpc8.c in Libav 12.3, an input file can result in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could leverage this vulnerability to cause a denial of service via a crafted file.
Impacted products
Vendor Product Version
libav libav 12.3
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mpc8_read_header in libavformat/mpc8.c in Libav 12.3, an input file can result in an avio_seek infinite loop and hang, with 100% CPU consumption. Attackers could leverage this vulnerability to cause a denial of service via a crafted file."
    },
    {
      "lang": "es",
      "value": "En la funci\u00f3n mpc8_read_header en el archivo libavformat/mpc8.c en Libav versi\u00f3n 12.3, un archivo de entrada puede resultar en un bucle infinito y suspensi\u00f3n de avio_seek, con un consumo del 100% de la CPU. Los atacantes podr\u00edan aprovechar esta vulnerabilidad para causar una denegaci\u00f3n de servicio por medio de un archivo dise\u00f1ado."
    }
  ],
  "id": "CVE-2019-14442",
  "lastModified": "2024-11-21T04:26:45.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-30T13:15:18.483",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1159"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-09 11:29
Modified
2024-11-21 03:57
Summary
In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file.
References
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file."
    },
    {
      "lang": "es",
      "value": "En Libav 12.3, un problema de desreferencia de puntero NULL (puntos RIP a cero) en ff_mpa_synth_filter_float en libavcodec/mpegaudiodsp_template.c puede provocar un fallo de segmentaci\u00f3n (cierre inesperado de la aplicaci\u00f3n) mediante un archivo mov manipulado."
    }
  ],
  "id": "CVE-2018-19129",
  "lastModified": "2024-11-21T03:57:23.060",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-09T11:29:03.767",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1138"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-22 20:29
Modified
2024-11-21 03:28
Summary
In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read.
References
cve@mitre.orghttps://bugzilla.libav.org/show_bug.cgi?id=1019Exploit, Issue Tracking, Patch, Third Party Advisory
cve@mitre.orghttps://patches.libav.org/patch/62534/Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.libav.org/show_bug.cgi?id=1019Exploit, Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://patches.libav.org/patch/62534/Mailing List, Patch, Third Party Advisory
Impacted products
Vendor Product Version
libav libav 9.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC929204-B8FE-48AE-8D32-DC6BFCB99DC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read."
    },
    {
      "lang": "es",
      "value": "En libavcodec en Libav 9.21, ff_h264_execute_ref_pic_marking (), tiene una lectura en exceso del b\u00fafer basado en pila."
    }
  ],
  "id": "CVE-2017-5984",
  "lastModified": "2024-11-21T03:28:49.903",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-22T20:29:00.497",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1019"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://patches.libav.org/patch/62534/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://patches.libav.org/patch/62534/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-16 16:59
Modified
2024-11-21 02:29
Severity ?
Summary
The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access.
Impacted products
Vendor Product Version
canonical ubuntu_linux 12.04
ffmpeg ffmpeg 2.0.6
ffmpeg ffmpeg 2.2.0
ffmpeg ffmpeg 2.2.1
ffmpeg ffmpeg 2.2.2
ffmpeg ffmpeg 2.2.3
ffmpeg ffmpeg 2.2.4
ffmpeg ffmpeg 2.2.5
ffmpeg ffmpeg 2.2.6
ffmpeg ffmpeg 2.2.7
ffmpeg ffmpeg 2.2.8
ffmpeg ffmpeg 2.2.9
ffmpeg ffmpeg 2.2.10
ffmpeg ffmpeg 2.2.11
ffmpeg ffmpeg 2.2.12
ffmpeg ffmpeg 2.2.13
ffmpeg ffmpeg 2.2.14
ffmpeg ffmpeg 2.4.0
ffmpeg ffmpeg 2.4.1
ffmpeg ffmpeg 2.4.2
ffmpeg ffmpeg 2.4.3
ffmpeg ffmpeg 2.4.4
ffmpeg ffmpeg 2.4.5
ffmpeg ffmpeg 2.4.6
ffmpeg ffmpeg 2.4.7
ffmpeg ffmpeg 2.5.0
ffmpeg ffmpeg 2.5.1
ffmpeg ffmpeg 2.5.2
ffmpeg ffmpeg 2.5.3
ffmpeg ffmpeg 2.5.4
ffmpeg ffmpeg 2.5.5
ffmpeg ffmpeg 2.6.0
ffmpeg ffmpeg 2.6.1
libav libav *
libav libav 11.0
libav libav 11.1
libav libav 11.2
libav libav 11.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07481C8-7CEB-4B81-B8E0-FF45DAA28870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593F9555-034A-41B6-A96E-5A4A03E8680E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF38DD1-2604-41AD-975A-56CC24767799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76392F6-6992-4B67-97BA-607A091DDA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB396E84-FE69-4E19-9937-B82A63D347AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9CF7C7-3730-43EC-B63E-B004D979E57A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "889B2130-CB88-487B-92FB-959DB44B8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9BE4879-972C-45EA-8253-46E5BE98FFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "653411BA-9F0B-4BFC-8A42-6576E956F96D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "268DAF2F-4484-4212-AEB0-F9A10596F874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCD7A424-DA4D-4508-B4EB-14A1BA65E596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C190A7C8-2DAE-4F72-A620-9D184CBF10B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8764DC-1C01-4C3E-A7AC-C8AF69F944E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A45FBF-A89E-4F1C-B397-AB2A53DB805C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B3B781-7DEC-475C-A429-11D1B2F69CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FDCCDDC-6CDA-4D3B-BB4C-C370C69EB1C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "48899BDA-F7FD-494A-A141-10FBD4DE67BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14D1738D-D85A-4650-9DAB-C626E7F52812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91B8DD5-FB80-47E7-8AF3-57D72CD4D034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ADB969-FA62-4238-83DF-D5703603A9FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D51D915-0FAF-449F-825B-1F2B1F9BAF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "19772D67-FAE5-4178-815D-4F511AE0411E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A6097F4-A8D1-4070-A4B2-8479421C15DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBBBB2E-F454-44F7-8131-BFF852BC6DE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF0FC9B-806E-4EC2-A644-B1C2CC26E6AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF38E5B7-AB89-418E-B507-3D660FE753C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5249D4A-D8D9-4B89-96B6-E957A2210750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "29619AAD-6792-4B38-8DFB-706BEACA46F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEC8E4-6B53-459E-B257-BEE424463592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0A20D5-EAFD-4B79-818A-B834E9A11C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "826DD95D-ADE5-443A-9057-D25CC6FD5801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE52F27-7AEC-40AB-9349-4C3E0E4743BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8452D8CC-D6D9-4864-AE9D-40CA53BB654B",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D00501-1CED-4AC5-98C5-4F9DA10D09FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FC79B9-3D67-4CD0-B68C-3671107DBE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5376C461-23BE-4717-AED3-B675110B6759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FA20D7-04C4-4E3C-9A4E-4DE52593F2C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n msrle_decode_pal4 en msrledec.c en Libav anterior a 10.7 y 11.x anterior a 11.4 y FFmpeg anterior a 2.0.7, 2.2.x anterior a 2.2.15, 2.4.x anterior a 2.4.8, 2.5.x anterior a 2.5.6, y 2.6.x anterior a 2.6.2 permite a atacantes remotos tener un impacto no especificado a trav\u00e9s de una imagen manipulada, relacionado con un puntero de pixels, lo que provoca un acceso a array fuera de rango."
    }
  ],
  "id": "CVE-2015-3395",
  "lastModified": "2024-11-21T02:29:21.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-06-16T16:59:04.237",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f7e1367f58263593e6cee3c282f7277d7ee9d553"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2015/dsa-3288"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/74433"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2944-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v11.4"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201603-06"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201705-08"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f7e1367f58263593e6cee3c282f7277d7ee9d553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2944-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v11.4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201603-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201705-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ffmpeg.org/security.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-10-02 20:55
Modified
2024-11-21 01:30
Severity ?
Summary
Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file.
References
Impacted products
Vendor Product Version
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
libav libav *
libav libav 0.3
libav libav 0.3.1
libav libav 0.3.2
libav libav 0.3.3
libav libav 0.3.4
libav libav 0.4.0
libav libav 0.4.1
libav libav 0.4.2
libav libav 0.4.3
libav libav 0.4.4
libav libav 0.4.5
libav libav 0.4.6
libav libav 0.4.7
libav libav 0.4.8
libav libav 0.4.9
libav libav 0.5
libav libav 0.5.4
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.7
libav libav 0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCCBE19F-8FC3-4F56-9BB4-8A8985E23F73",
              "versionEndIncluding": "0.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF0C60B-501B-4BF6-B3F2-268625EB4DA3",
              "versionEndIncluding": "0.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB86B78D-837D-481F-A6E8-F48501E08D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5056E88C-1F9D-4138-A291-D28CB6766D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D7B815-46FE-4EB6-A922-5B174B74F4D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ECC4210-D6A3-4ECC-A042-2107FD655A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EE1D87-553D-4EA6-BFA7-58CBA7819A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDE9C28-FCF7-4CF8-A657-780F18769980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1607C08-0CAD-4148-9F0E-74E53D364156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B957D8F4-F012-4FF5-87B5-3D31936004DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9344E3-FBB0-4777-889A-D40438C3C560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D53D47A-8946-4EB3-8A2B-4A87E0AADD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F28C3ED-FE8A-4404-9CD7-9119373C6EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B473F20B-FE7F-4AB4-86AB-BE50E68A1E55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E0C3E3-7935-4569-B086-9C1CA048EE68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EBAC6A-AAD3-4F7F-8500-C98EB2BD4468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "38A1F1CF-56FD-46C4-AABA-AA72648D7863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file."
    },
    {
      "lang": "es",
      "value": "Error de signo de entero en la funci\u00f3n decode_residual_block en cavsdec.c en libavcodec de FFmpeg antes de v0.7.3 y en v0.8.x antes de v0.8.2, y v0.7.1 a trav\u00e9s de libav, permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo de la aplicaci\u00f3n ) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo de v\u00eddeo AVS chino (tambi\u00e9n conocido como CAVS)."
    }
  ],
  "id": "CVE-2011-3362",
  "lastModified": "2024-11-21T01:30:20.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-10-02T20:55:01.320",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=91d5da9321c52e8197fb14046ebb335f3e6ff4a0"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c5cbda50793e311aa73489d12184ffd6761c9fbf"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45532"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ocert.org/advisories/ocert-2011-002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/09/13/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/09/14/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=91d5da9321c52e8197fb14046ebb335f3e6ff4a0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c5cbda50793e311aa73489d12184ffd6761c9fbf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ocert.org/advisories/ocert-2011-002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/09/13/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/09/14/8"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 21:59
Modified
2024-11-21 02:57
Summary
Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
Impacted products
Vendor Product Version
libav libav *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "032D8A36-9593-448C-98B1-8B55D8D712A8",
              "versionEndIncluding": "11.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n aac_sync en aac_parser.c en Libav en versiones anteriores a 11.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un archivo manipulado."
    }
  ],
  "id": "CVE-2016-7393",
  "lastModified": "2024-11-21T02:57:54.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T21:59:00.200",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/10/5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92902"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=fb1473080223a634b8ac2cca48a632d037a0a69d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/10/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92902"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=fb1473080223a634b8ac2cca48a632d037a0a69d"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-10 22:55
Modified
2024-11-21 01:39
Severity ?
Summary
Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2784.
References
chrome-cve-admin@google.comhttp://ffmpeg.org/security.html
chrome-cve-admin@google.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.7.7.changelog
chrome-cve-admin@google.comhttp://libav.org/releases/libav-0.8.4.changelog
chrome-cve-admin@google.comhttp://secunia.com/advisories/50468
chrome-cve-admin@google.comhttp://secunia.com/advisories/51257
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:079
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/08/31/3
chrome-cve-admin@google.comhttp://www.openwall.com/lists/oss-security/2012/09/02/4
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/55355
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/security.html
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.7.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.8.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50468
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51257
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/08/31/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/02/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55355
Impacted products
Vendor Product Version
libav libav 0.8
libav libav 0.8
libav libav 0.8.1
libav libav 0.8.2
libav libav 0.8.3
ffmpeg ffmpeg *
ffmpeg ffmpeg 0.3
ffmpeg ffmpeg 0.3.1
ffmpeg ffmpeg 0.3.2
ffmpeg ffmpeg 0.3.3
ffmpeg ffmpeg 0.3.4
ffmpeg ffmpeg 0.4.0
ffmpeg ffmpeg 0.4.2
ffmpeg ffmpeg 0.4.3
ffmpeg ffmpeg 0.4.4
ffmpeg ffmpeg 0.4.5
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.7.9
ffmpeg ffmpeg 0.7.11
ffmpeg ffmpeg 0.7.12
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7
ffmpeg ffmpeg 0.8.8
ffmpeg ffmpeg 0.8.10
ffmpeg ffmpeg 0.8.11
ffmpeg ffmpeg 0.9
ffmpeg ffmpeg 0.9.1
ffmpeg ffmpeg 0.10
ffmpeg ffmpeg 0.10.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
libav libav 0.7.2
libav libav 0.7.3
libav libav 0.7.4
libav libav 0.7.5
libav libav 0.7.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A42948-6239-4DEB-8BF0-39971D60207E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "622D8D69-5FFB-4217-81B5-5FBC08A17C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCA4543-F6CE-4B37-859F-4A39174F070D",
              "versionEndIncluding": "0.10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2649A80-4739-4BBB-AB0B-99AD435BE7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2E77D-B826-4B49-ADC8-7F704E149A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18157837-4550-45E3-A12E-AE06E047E253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F42611-C3E2-416B-9AE7-A5AE83E4DEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A20789F-26E3-4871-B24E-25E922BADDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C6C243-3ACC-49C3-80CA-D7CA8FEFF0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE6D368-0BA6-4499-B7E1-EE16C03012E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C0F6EF-0452-4AFE-AF3E-B88F963A0938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4DD372-4D3B-445C-8C38-E083A3C0D4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "733C03D7-2780-4D69-A98D-BCFB91D1119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "2E1A7011-B992-4E35-B306-45772DACB23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0A27B-66D7-4D1B-8E6A-F4722C070BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "864DC4A2-A378-4389-B62E-9E785879A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16304267-C808-4B6B-9903-2DEAB40AD899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEBBA83-1BFC-45A8-B34A-AB3A9B8A9414",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A452FEA8-93B8-4A08-8E07-3FD72687AB1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to \"width/height changing in CAVS,\" a different vulnerability than CVE-2012-2784."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la funci\u00f3n decode_pic en libavcodec/cavsdec.c en FFmpeg anterior a v0.11 tiene un impacto desconocido y vectores de ataque, relacionado con \"width/height cambiando en CAVS\", una vulnerabilidad diferente a CVE-2012-2784."
    }
  ],
  "id": "CVE-2012-2777",
  "lastModified": "2024-11-21T01:39:36.677",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-10T22:55:03.243",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/55355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ffmpeg.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.7.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.8.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55355"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-05-17 04:29
Modified
2024-11-21 03:42
Summary
An issue was discovered in Libav 12.3. A read access violation in the in_table_init16 function in libavcodec/aacsbr.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
Impacted products
Vendor Product Version
libav libav 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84452BF0-1880-44B1-8BFD-87AD5DFD625C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Libav 12.3. A read access violation in the in_table_init16 function in libavcodec/aacsbr.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto un problema en Libav 12.3. Violaci\u00f3n de acceso de lectura en la funci\u00f3n in_table_init16 en libavcodec/aacsbr.c permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado de la aplicaci\u00f3n), tal y como queda demostrado con avconv."
    }
  ],
  "id": "CVE-2018-11224",
  "lastModified": "2024-11-21T03:42:56.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-05-17T04:29:00.207",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1129"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://docs.google.com/document/d/16_HC-FjFuBNMbaoR397z_3EwpDP6wb1DNWrfkD4qRDE/edit"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-04 08:29
Modified
2024-11-21 03:17
Summary
The ff_free_picture_tables function in libavcodec/mpegpicture.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv.
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_free_picture_tables function in libavcodec/mpegpicture.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_free_picture_tables en libavcodec/mpegpicture.c en Libav 12.2 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica o heap y cierre inesperado de la aplicaci\u00f3n) o, probablemente, causen cualquier otro tipo de impacto mediante un archivo modificado, relacionado con vc1_decode_i_blocks_adv."
    }
  ],
  "id": "CVE-2017-17130",
  "lastModified": "2024-11-21T03:17:32.617",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-04T08:29:00.793",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 21:59
Modified
2024-11-21 02:58
Summary
The ff_put_pixels8_xy2_mmx function in rnd_template.c in Libav 11.7 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted mp3 file. NOTE: this issue was originally reported as involving a NULL pointer dereference.
Impacted products
Vendor Product Version
libav libav 11.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35351CFD-65C7-42A0-9B40-0D1D7009477C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ff_put_pixels8_xy2_mmx function in rnd_template.c in Libav 11.7 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted mp3 file.  NOTE: this issue was originally reported as involving a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ff_put_pixels8_xy2_mmx en rnd_template.c en Libav 11.7 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (acceso de memoria inv\u00e1lido y ca\u00edda) a trav\u00e9s de un archivo mp3 manipulado. NOTA: este problema fue originalmente reportado como involucrando una referencia a puntero NULL."
    }
  ],
  "id": "CVE-2016-7477",
  "lastModified": "2024-11-21T02:58:04.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T21:59:00.230",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/21/6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93042"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/21/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://blogs.gentoo.org/ago/2016/09/20/libav-null-pointer-dereference-in-ff_put_pixels8_xy2_mmx-rnd_template-c/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-22 21:29
Modified
2024-11-21 03:19
Summary
The apply_dependent_coupling function in libavcodec/aacdec.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file.
References
Impacted products
Vendor Product Version
libav libav 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F87DEA5-F8BE-4657-B131-9C56ADF746DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The apply_dependent_coupling function in libavcodec/aacdec.c in Libav 12.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted aac file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n apply_dependent_coupling en libavcodec/aacdec.c en Libav 12.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) utilizando un archivo aac manipulado."
    }
  ],
  "id": "CVE-2017-18242",
  "lastModified": "2024-11-21T03:19:39.800",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-22T21:29:00.307",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.libav.org/show_bug.cgi?id=1093"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
Integer overflow in the vp3_dequant function in the VP3 decoder (vp3.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VP3 stream, which triggers a buffer overflow.
References
secalert@redhat.comhttp://ffmpeg.org/Vendor Advisory
secalert@redhat.comhttp://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f
secalert@redhat.comhttp://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5
secalert@redhat.comhttp://libav.org/Vendor Advisory
secalert@redhat.comhttp://libav.org/releases/libav-0.5.6.changelog
secalert@redhat.comhttp://libav.org/releases/libav-0.6.4.changelog
secalert@redhat.comhttp://libav.org/releases/libav-0.7.3.changelog
secalert@redhat.comhttp://ubuntu.com/usn/usn-1320-1
secalert@redhat.comhttp://ubuntu.com/usn/usn-1333-1
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:074
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:075
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:076
secalert@redhat.comhttp://www.securityfocus.com/archive/1/520622
af854a3a-2127-422b-91ae-364da2661108http://ffmpeg.org/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5
af854a3a-2127-422b-91ae-364da2661108http://libav.org/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.5.6.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.6.4.changelog
af854a3a-2127-422b-91ae-364da2661108http://libav.org/releases/libav-0.7.3.changelog
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1320-1
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1333-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:074
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:075
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:076
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/520622
Impacted products
Vendor Product Version
libav libav 0.5
libav libav 0.5.1
libav libav 0.5.2
libav libav 0.5.3
libav libav 0.5.4
libav libav 0.5.5
libav libav 0.6
libav libav 0.6.1
libav libav 0.6.2
libav libav 0.6.3
libav libav 0.7
libav libav 0.7
libav libav 0.7
libav libav 0.7.1
ffmpeg ffmpeg 0.5
ffmpeg ffmpeg 0.5.1
ffmpeg ffmpeg 0.5.2
ffmpeg ffmpeg 0.5.3
ffmpeg ffmpeg 0.5.4
ffmpeg ffmpeg 0.5.4.5
ffmpeg ffmpeg 0.5.4.6
ffmpeg ffmpeg 0.6
ffmpeg ffmpeg 0.6.1
ffmpeg ffmpeg 0.6.2
ffmpeg ffmpeg 0.6.3
ffmpeg ffmpeg 0.7
ffmpeg ffmpeg 0.7.1
ffmpeg ffmpeg 0.7.2
ffmpeg ffmpeg 0.7.3
ffmpeg ffmpeg 0.7.4
ffmpeg ffmpeg 0.7.5
ffmpeg ffmpeg 0.7.6
ffmpeg ffmpeg 0.7.7
ffmpeg ffmpeg 0.7.8
ffmpeg ffmpeg 0.8.0
ffmpeg ffmpeg 0.8.1
ffmpeg ffmpeg 0.8.2
ffmpeg ffmpeg 0.8.5
ffmpeg ffmpeg 0.8.5.3
ffmpeg ffmpeg 0.8.5.4
ffmpeg ffmpeg 0.8.6
ffmpeg ffmpeg 0.8.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D486C17-FC4A-4AEE-A430-1B1FBCC2C27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "632BC7C2-FE59-47B0-885C-0EB8C74DF041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1AE0BF-A6FD-4EBA-BF61-07AC81EA560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FA106-FE65-4BB0-92A7-E8A5AF978A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "514669DA-8D02-44CE-BE18-8783F69AE394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8041E6ED-472A-40DF-AA90-F3509D90D47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C64382-9259-4D61-B352-7F123527289C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FBB817-A186-4517-9DA7-B3638576AAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "157ABA40-6101-4E9C-A24C-84F8E23D374D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7EA46DD-2CC4-426F-8709-821B7572C94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE12C59-4409-4F7A-9759-7B26FA9DAC34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FE6578-F031-4F5B-B955-8F912CFCA1B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60705A3B-7136-45D1-8068-E2DC9E01EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C722B143-2648-4EB2-A090-7B788F41F300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31AFDBC-A782-4C18-8EAA-6D927397BEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E9E8F4-A942-4F34-BCE2-82A180F1DD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87090477-1D36-48B3-88AE-5CD5EE8F89D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096FF8B-9B57-4C59-84DB-9CC0DEAB47AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C99254-776C-4AAD-BDA2-3F544256AA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDBF2C0-8E33-4575-8A19-4F1CABA3023F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72040664-077A-48FB-9E6B-B69EA8D26CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the vp3_dequant function in the VP3 decoder (vp3.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VP3 stream, which triggers a buffer overflow."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n vp3_dequant en el decodificador VP3 (vp3.c) en libavcodec en FFmpeg v0.5.x anterior a v0.5.7, v0.6.x anterior a v0.6.4, v0.7.x anterior a v0.7.9, y v0.8.x anterior a v0.8.8; y en Libav v0.5.x anterior a v0.5.6, v0.6.x anterior a v0.6.4, y v0.7.x anterior a v0.7.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un (stream) VP3 manipulado, lo que provoca un desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2011-4352",
  "lastModified": "2024-11-21T01:32:17.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-20T20:55:02.783",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/520622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ffmpeg.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=8b94df0f2047e9728cb872adc9e64557b7a5152f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=eef5c35b4352ec49ca41f6198bee8a976b1f81e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://libav.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.5.6.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.6.4.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://libav.org/releases/libav-0.7.3.changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1320-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1333-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/520622"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}