Jump to content

Advisories (MDKSA-2005:231 ): ffmpeg


aru
 Share

Recommended Posts

Mandriva Advisories MDKSA-2005:231 : ffmpeg

 

Updated ffmpeg packages fix buffer overflow vulnerability

December 14th, 2005

 

Simon Kilvington discovered a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. The vulnerability is caused due to a boundary error in the "avcodec_default_get_buffer()" function of "utils.c" in libavcodec. This can be exploited to cause a heap-based buffer overflow when a specially-crafted 1x1 ".png" file containing a palette is read. The updated packages have been patched to prevent this problem.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • CS3.0
  • 2006.0

Full information about this advisory, including the updated packages, is available at:

wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:231

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...