Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/08/13/1 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/18/1 | Exploit Mailing List Patch Third Party Advisory |
https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/ | Exploit Third Party Advisory |
https://bugzilla.libav.org/show_bug.cgi?id=825 | Exploit Issue Tracking Patch Third Party Advisory VDB Entry |
https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=0ac8ff618c5e6d878c547a8877e714ed728950ce |
Configurations
History
No history.
Information
Published : 2017-02-15 19:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-6832
Mitre link : CVE-2016-6832
CVE.ORG link : CVE-2016-6832
JSON object : View
Products Affected
libav
- libav
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer