Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0873

Опубликовано: 13 фев. 2013
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

The read_header function in libavcodec/shorten.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid channel count, related to "freeing invalid addresses."

Отчет

The Red Hat Security Response Team has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5qffmpegWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1034565qffmpeg: Invalid free in libavcodec/shorten.c due to invalid channel count

EPSS

Процентиль: 83%
0.02012
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The read_header function in libavcodec/shorten.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid channel count, related to "freeing invalid addresses."

nvd
около 12 лет назад

The read_header function in libavcodec/shorten.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid channel count, related to "freeing invalid addresses."

debian
около 12 лет назад

The read_header function in libavcodec/shorten.c in FFmpeg before 1.1. ...

github
больше 3 лет назад

The read_header function in libavcodec/shorten.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid channel count, related to "freeing invalid addresses."

EPSS

Процентиль: 83%
0.02012
Низкий

5.1 Medium

CVSS2