Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1999011

Опубликовано: 23 июл. 2018
Источник: debian
EPSS Низкий

Описание

FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegfixed7:4.0.2-1package
libavremovedpackage
libavnot-affectedjessiepackage

Примечания

  • https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a58286

EPSS

Процентиль: 87%
0.033
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.

CVSS3: 8.8
nvd
больше 7 лет назад

FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.

CVSS3: 8.8
github
больше 3 лет назад

FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.

CVSS3: 8.8
fstec
больше 7 лет назад

Уязвимость мультимедийной библиотеки FFmpeg, связанная с переполнением буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

suse-cvrf
больше 7 лет назад

Security update for ffmpeg

EPSS

Процентиль: 87%
0.033
Низкий