Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/01/31/12 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/02/02/1 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/95989 | |
https://ffmpeg.org/security.html | Release Notes Vendor Advisory |
https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7 | Patch |
https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-02-09 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-10191
Mitre link : CVE-2016-10191
CVE.ORG link : CVE-2016-10191
JSON object : View
Products Affected
ffmpeg
- ffmpeg
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer