Описание
The swr_init function in libswresample/swresample.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid or unsupported (1) input or (2) output channel layout, related to an out-of-bounds array access.
The swr_init function in libswresample/swresample.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid or unsupported (1) input or (2) output channel layout, related to an out-of-bounds array access.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-0872
- https://security.gentoo.org/glsa/201603-06
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=21cd905cd44a4bbafe8631bbaa6021d328413ce5
- http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21cd905cd44a4bbafe8631bbaa6021d328413ce5
- http://www.ffmpeg.org/security.html
Связанные уязвимости
The swr_init function in libswresample/swresample.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid or unsupported (1) input or (2) output channel layout, related to an out-of-bounds array access.
The swr_init function in libswresample/swresample.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid or unsupported (1) input or (2) output channel layout, related to an out-of-bounds array access.
The swr_init function in libswresample/swresample.c in FFmpeg before 1 ...