Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7013

Опубликовано: 09 дек. 2013
Источник: debian
EPSS Низкий

Описание

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegnot-affectedpackage
libavnot-affectedpackage

Примечания

  • https://github.com/FFmpeg/FFmpeg/commit/821a5938d100458f4d09d634041b05c860554ce0

  • https://trac.ffmpeg.org/ticket/2922

  • Only present in libav trunk

EPSS

Процентиль: 78%
0.01199
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

nvd
около 12 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

github
больше 3 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

EPSS

Процентиль: 78%
0.01199
Низкий