FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104896 | Third Party Advisory VDB Entry |
https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | Issue Tracking Patch Third Party Advisory |
https://seclists.org/bugtraq/2019/May/60 | |
https://www.debian.org/security/2019/dsa-4449 |
Configurations
History
No history.
Information
Published : 2018-07-23 15:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-1999011
Mitre link : CVE-2018-1999011
CVE.ORG link : CVE-2018-1999011
JSON object : View
Products Affected
ffmpeg
- ffmpeg
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer