Release date:
Updated on:
Affected Systems:
FFmpeg 0.x
FFmpeg
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53389
Cve id: CVE-2012-0947
FFmpeg is a free software that allows you to perform video, transfer, and stream functions in multiple formats of audio and video.
FFmpeg has multiple implementation vulnerabilities that can be exploited by malicious users to control applications.
1) when parsing some parameters, there is a format string error in the "srt_to_ass ()" function (libavcodec/srtdec. c;
2) when processing certain action data, an integer overflow error exists in the "dirac_unpack_block_motion_data ()" function (libavcodec/diracdec. c;
3) when decoding some proportional data, an integer overflow error exists in the "sws_init_context ()" function (libswscale/utils. c;
4) when decoding a VQA media file, an error occurs in the "vqa_decode_init ()" function (libavcodec/vqavideo. c), which may cause heap buffer overflow.
<* Source: Fabian Yamaguchi
Link: http://seclists.org/oss-sec/2012/q2/att-231/0001-vqavideo-return-error-if-image-size-is-not-a-multipl.patch
Http://secunia.com/advisories/48770/
Http://secunia.com/advisories/47765/
Http://secunia.com/advisories/47383/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
FFmpeg
------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://ffmpeg.sourceforge.net/