SB2013112311 - Multiple vulnerabilities in ffmpeg.sourceforge.net FFmpeg



SB2013112311 - Multiple vulnerabilities in ffmpeg.sourceforge.net FFmpeg

Published: November 23, 2013 Updated: October 12, 2021

Security Bulletin ID SB2013112311
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2013-4263)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

libavfilter in FFmpeg before 2.0.1 has unspecified impact and remote vectors related to a crafted "plane," which triggers an out-of-bounds heap write.


2) Buffer overflow (CVE-ID: CVE-2013-4264)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.


3) NULL pointer dereference (CVE-ID: CVE-2013-4265)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. http://cwe.mitre.org/data/definitions/476. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.