GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Sep 13, 2006 7:26 pm Post subject: [ GLSA 200609-09 ] FFmpeg: Buffer overflows |
|
|
Gentoo Linux Security Advisory
Title: FFmpeg: Buffer overflows (GLSA 200609-09)
Severity: normal
Exploitable: remote
Date: September 13, 2006
Updated: December 13, 2006
Bug(s): #133520
ID: 200609-09
Synopsis
FFmpeg is vulnerable to multiple buffer overflows that might be exploited to execute arbitrary code.
Background
FFmpeg is a very fast video and audio converter.
Affected Packages
Package: media-video/ffmpeg
Vulnerable: < 0.4.9_p20060530
Unaffected: >= 0.4.9_p20060530
Architectures: All supported architectures
Description
FFmpeg contains buffer overflows in the AVI processing code.
Impact
An attacker could trigger the buffer overflows by enticing a user to load a specially crafted AVI file in an application using the FFmpeg library. This might result in the execution of arbitrary code in the context of the running application.
Workaround
There is no known workaround at this time.
Resolution
All FFmpeg users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20060530" |
References
CVE-2006-4799
CVE-2006-4800
Last edited by GLSA on Thu Dec 14, 2006 4:18 am; edited 1 time in total |
|