Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2566

Опубликовано: 23 сент. 2022
Источник: debian

Описание

A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc()`. An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegfixed7:5.1.1-1package
ffmpegnot-affectedbullseyepackage
ffmpegnot-affectedbusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2126833

  • https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=6f53f0d09ea4c9c7f7354f018a87ef840315207d (n5.1.1)

  • Introduced in https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ab77b878f1205225c6de1370fb0e998dbcc8bc69 (n5.1)

  • https://github.com/google/security-research/security/advisories/GHSA-vhxg-9wfx-7fcj

Связанные уязвимости

CVSS3: 9
ubuntu
больше 3 лет назад

A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc()`. An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05

CVSS3: 9
nvd
больше 3 лет назад

A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc()`. An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05

CVSS3: 7.8
github
больше 3 лет назад

A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc(). An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05

CVSS3: 7.8
fstec
больше 3 лет назад

Уязвимость функции build_open_gop_key_points компонента libavformat/mov.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании