FFmpeg 2.0 libavcodec/msrle.c msrle_decode_frame Pufferüberlauf

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a FFmpeg 2.0. Tabbas, aikin msrle_decode_frame ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil libavcodec/msrle.c, a cikin sashi $software_component. Wuro manipulation ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-119. Matsalar nan ta fara bayyana a 07/11/2013. Lalle, rauni an sanar da shi 02/16/2014 daga Mateusz Jurczyk and Gynvael Coldwind (j00ru) tare da Google Security Team da avcodec/msrle: use av_image_get_linesize() to calculate the linesize da GIT Commit (GIT Repository). Ana samun bayanin tsaro don saukewa a git.videolan.org. Ana kiran wannan rauni da CVE-2014-125013. Ngam yiɗi ka a tuma ndiyam ka nder internet. Bayani na fasaha ga. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. 0-day ga, an ndiyam a wuro be $0-$5k. Gyaran matsalar yana nan a shirye don saukewa a git.videolan.org. Ya kamata a yi amfani da patch don magance wannan matsala. An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: SecurityFocus (BID 65671), X-Force (91254) , Secunia (SA57066). If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 Goyarwa · 63 Datenpunkte

FurɗeSúgá
02/24/2014 08:05
Gargadi 1/2
04/17/2019 06:55
Gargadi 2/2
06/17/2022 23:29
software_typeMultimedia Processing SoftwareMultimedia Processing SoftwareMultimedia Processing Software
software_nameFFmpegFFmpegFFmpeg
software_version2.02.02.0
software_filelibavcodec/msrle.clibavcodec/msrle.clibavcodec/msrle.c
software_functionmsrle_decode_framemsrle_decode_framemsrle_decode_frame
vulnerability_introductiondate1373500800 (07/11/2013)1373500800 (07/11/2013)1373500800 (07/11/2013)
vulnerability_risk111
cvss2_vuldb_basescore4.34.34.3
cvss2_vuldb_tempscore3.23.23.2
cvss2_vuldb_avNNN
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss3_meta_basescore5.35.35.3
cvss3_meta_tempscore4.64.64.6
cvss3_vuldb_basescore5.35.35.3
cvss3_vuldb_tempscore4.64.64.6
advisory_date1392508800 (02/16/2014)1392508800 (02/16/2014)1392508800 (02/16/2014)
advisory_locationGIT RepositoryGIT RepositoryGIT Repository
advisory_typeGIT CommitGIT CommitGIT Commit
advisory_urlhttp://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2
advisory_identifieravcodec/msrle: use av_image_get_linesize() to calculate the linesizeavcodec/msrle: use av_image_get_linesize() to calculate the linesizeavcodec/msrle: use av_image_get_linesize() to calculate the linesize
person_nameMateusz Jurczyk/Gynvael ColdwindMateusz Jurczyk/Gynvael ColdwindMateusz Jurczyk/Gynvael Coldwind
person_websitehttp://www.google.comhttp://www.google.comhttp://www.google.com
company_nameGoogle Security TeamGoogle Security TeamGoogle Security Team
price_0day$0-$5k$0-$5k$0-$5k
countermeasure_nameKariKariKari
countermeasure_patch_urlhttp://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2
source_secunia570665706657066
secunia_titleFFmpeg Multiple VulnerabilitiesFFmpeg Multiple VulnerabilitiesFFmpeg Multiple Vulnerabilities
secunia_riskLess CriticalLess CriticalLess Critical
source_securityfocus656716567165671
securityfocus_titleFFmpeg Multiple Security VulnerabilitiesFFmpeg Multiple Security VulnerabilitiesFFmpeg Multiple Security Vulnerabilities
source_xforce912549125491254
xforce_titleFFmpeg msrle_decode_frame() denial of serviceFFmpeg msrle_decode_frame() denial of serviceFFmpeg msrle_decode_frame() denial of service
xforce_identifierffmpeg-msrledecodeframe-dosffmpeg-msrledecodeframe-dosffmpeg-msrledecodeframe-dos
xforce_riskMedium RiskMedium RiskMedium Risk
source_seealso12390 12391 12392 12393 1259112390 12391 12392 12393 1259112390 12391 12392 12393 12591
vulnerability_cweCWE-119 (Pufferüberlauf)CWE-119 (Pufferüberlauf)CWE-119 (Pufferüberlauf)
cvss2_vuldb_eUUU
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcCCC
cvss3_vuldb_eUUU
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
0day_days220220220
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
person_nicknamej00ruj00ru
source_secunia_date1392768000 (02/19/2014)1392768000 (02/19/2014)
source_securityfocus_date1392681600 (02/18/2014)1392681600 (02/18/2014)
securityfocus_classBoundary Condition ErrorBoundary Condition Error
source_cveCVE-2014-125013
cna_responsibleVulDB

Do you want to use VulDB in your project?

Use the official API to access entries easily!