In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3996 | |
http://www.securityfocus.com/bid/100631 | |
https://github.com/FFmpeg/FFmpeg/commit/7e80b63ecd259d69d383623e75b318bf2bd491f6 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-08-31T15:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2017-08-31T00:00:00
Link: CVE-2017-14059
JSON object: View
NVD Information
Status : Modified
Published: 2017-08-31T15:29:00.483
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-14059
JSON object: View
Redhat Information
No data.
CWE