FKIE_CVE-2012-0859
Vulnerability from fkie_nvd - Published: 2012-08-20 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The render_line function in the vorbis codec (vorbis.c) in libavcodec in FFmpeg before 0.9.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Vorbis file, related to a large multiplier. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3893.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ffmpeg | ffmpeg | * | |
| ffmpeg | ffmpeg | 0.7.1 | |
| ffmpeg | ffmpeg | 0.7.2 | |
| ffmpeg | ffmpeg | 0.7.7 | |
| ffmpeg | ffmpeg | 0.7.8 | |
| ffmpeg | ffmpeg | 0.7.9 | |
| ffmpeg | ffmpeg | 0.7.11 | |
| ffmpeg | ffmpeg | 0.7.12 | |
| ffmpeg | ffmpeg | 0.8.5 | |
| ffmpeg | ffmpeg | 0.8.6 | |
| ffmpeg | ffmpeg | 0.8.7 | |
| ffmpeg | ffmpeg | 0.8.8 | |
| ffmpeg | ffmpeg | 0.8.10 | |
| ffmpeg | ffmpeg | 0.8.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D15FD45D-03F0-4EA0-9CEB-B7E7C62478D0",
"versionEndIncluding": "0.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07669E0E-8C4B-430E-802F-F64EEA2B5A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EB7F17-F25D-4E48-8A43-F799619CE71F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AAA31D75-C3FB-4D89-8B2D-21372AAEB78B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B20E5358-826C-47A2-B39F-ED4E9213BA95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "26321888-E140-4F09-AAA0-7392AA7F6307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7E46B9F3-A9C0-4B8A-A119-40CA4CBBD0EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "44800572-71C5-4AA1-9CB6-30AA902B0353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE9D7B73-9CDA-4BAE-8DD9-8E1E34C20648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F428A2E4-A54F-4296-A00F-1A4E160253D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5239E4FA-0359-49F1-93D4-24AB013FAC20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C8230D-4E89-45F9-B0F7-E317119E0FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "585CE7D2-1CE8-44AB-AE67-07D7D3721F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81C339-A794-4303-B829-BE743DF0B132",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The render_line function in the vorbis codec (vorbis.c) in libavcodec in FFmpeg before 0.9.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Vorbis file, related to a large multiplier. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3893."
},
{
"lang": "es",
"value": "La funci\u00f3n render_line en el codec Vorbis (vorbis.c) en libavcodec de FFmpeg antes de v0.9.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo Vorbis modificado, a\u00f1adiendo un multiplicador de gran tama\u00f1o. NOTA: esta vulnerabilidad se debe a un arreglo incompleto para CVE-2011-3893.\r\n"
}
],
"id": "CVE-2012-0859",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-20T18:55:02.903",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://ffmpeg.org/security.html"
},
{
"source": "secalert@redhat.com",
"url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=6fcf2bb8af0e7d6bb179e71e67e5fab8ef0d2ec2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1479-1"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ffmpeg.org/security.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=6fcf2bb8af0e7d6bb179e71e67e5fab8ef0d2ec2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1479-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78925"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…