SB2016120312 - Multiple vulnerabilities in FFmpeg
Published: December 3, 2016 Updated: June 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2014-8548)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Off-by-one error in libavcodec/smc.c in FFmpeg before 2.4.2 allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted Quicktime Graphics (aka SMC) video data.
2) Buffer overflow (CVE-ID: CVE-2014-8547)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
libavcodec/gifdec.c in FFmpeg before 2.4.2 does not properly compute image heights, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted GIF data.
3) Input validation error (CVE-ID: CVE-2014-8544)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
libavcodec/tiff.c in FFmpeg before 2.4.2 does not properly validate bits-per-pixel fields, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted TIFF data.
4) Input validation error (CVE-ID: CVE-2014-8543)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
libavcodec/mmvideo.c in FFmpeg before 2.4.2 does not consider all lines of HHV Intra blocks during validation of image height, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted MM video data.
5) Buffer overflow (CVE-ID: CVE-2014-8541)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
libavcodec/mjpegdec.c in FFmpeg before 2.4.2 considers only dimension differences, and not bits-per-pixel differences, when determining whether an image size has changed, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted MJPEG data.
6) Stack-based buffer overflow (CVE-ID: CVE-2008-3162)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the str_read_packet function in libavformat/psxstr.c when processing a crafted STR file that interleaves audio and video sectors. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Input validation error (CVE-ID: CVE-2006-4800)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service or possibly execute arbitrary code via multiple unspecified vectors in (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, and (13) tta.c.
Remediation
Install update from vendor's website.
References
- http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c727401aa9d62335e89d118a5b4e202edf39d905
- http://www.ffmpeg.org/security.html
- http://www.ubuntu.com/usn/USN-2534-1
- https://security.gentoo.org/glsa/201603-06
- http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8f1457864be8fb9653643519dea1c6492f1dde57
- http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e1c0cfaa419aa5d320540d5a1b3f8fd9b82ab7e5
- http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8b0e96e1f21b761ca15dbb470cd619a1ebf86c3e
- http://git.videolan.org/?p=ffmpeg.git;a=commit;h=5c378d6a6df8243f06c87962b873bd563e58cd39
- http://www.ubuntu.com/usn/USN-2944-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489965
- http://secunia.com/advisories/30994
- http://secunia.com/advisories/31268
- http://secunia.com/advisories/34385
- http://secunia.com/advisories/34905
- http://security.gentoo.org/glsa/glsa-200903-33.xml
- http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=13993
- http://www.debian.org/security/2009/dsa-1781
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:157
- http://www.openwall.com/lists/oss-security/2008/07/09/9
- http://www.openwall.com/lists/oss-security/2008/07/16/4
- http://www.securityfocus.com/bid/30154
- http://www.ubuntu.com/usn/usn-630-1
- http://www.vupen.com/english/advisories/2008/2031/references
- https://roundup.mplayerhq.hu/roundup/ffmpeg/issue311
- http://bugs.gentoo.org/show_bug.cgi?id=133520
- http://secunia.com/advisories/21921
- http://secunia.com/advisories/22180
- http://secunia.com/advisories/22181
- http://secunia.com/advisories/22182
- http://secunia.com/advisories/22198
- http://secunia.com/advisories/22200
- http://secunia.com/advisories/22201
- http://secunia.com/advisories/22202
- http://secunia.com/advisories/22203
- http://secunia.com/advisories/22230
- http://secunia.com/advisories/23010
- http://secunia.com/advisories/23213
- http://security.gentoo.org/glsa/glsa-200609-09.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:173
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:174
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:175
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:176
- http://www.novell.com/linux/security/advisories/2006_73_mono.html
- http://www.securityfocus.com/bid/20009
- http://www.ubuntu.com/usn/usn-358-1
- http://www.us.debian.org/security/2006/dsa-1215