Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9676

Опубликовано: 28 фев. 2015
Источник: debian
EPSS Низкий

Описание

The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegnot-affectedpackage
libavfixed6:11.2-1package

Примечания

  • Patch in https://www.openwall.com/lists/oss-security/2015/01/04/10 seem to apply for libav

  • ffmpeg: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=169065fbfb3da1ab776379c333aebc54bb1f1bc4

  • libav: https://git.libav.org/?p=libav.git;a=commit;h=b3f04657368a32a9903406395f865e230b1de348

  • https://www.openwall.com/lists/oss-security/2015/01/04/10

EPSS

Процентиль: 81%
0.01607
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

nvd
почти 11 лет назад

The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

github
больше 3 лет назад

The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

EPSS

Процентиль: 81%
0.01607
Низкий