Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14169

Опубликовано: 07 сент. 2017
Источник: debian
EPSS Низкий

Описание

In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegfixed7:3.3.4-1package
libavremovedpackage

Примечания

  • libav in Jessie uses a different guard for item_num. Check whether

  • the guard is necessary at all.

  • https://github.com/FFmpeg/FFmpeg/commit/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad

EPSS

Процентиль: 47%
0.00237
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.

CVSS3: 8.8
nvd
почти 8 лет назад

In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.

CVSS3: 8.8
github
больше 3 лет назад

In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.

suse-cvrf
почти 8 лет назад

Security update for ffmpeg, ffmpeg2

suse-cvrf
почти 8 лет назад

Security update for ffmpeg, ffmpeg2

EPSS

Процентиль: 47%
0.00237
Низкий