FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104896 | Third Party Advisory VDB Entry |
https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | Issue Tracking Patch Third Party Advisory |
https://seclists.org/bugtraq/2019/May/60 | |
https://www.debian.org/security/2019/dsa-4449 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-07-23T15:00:00
Updated: 2019-05-23T10:06:02
Reserved: 2018-07-13T00:00:00
Link: CVE-2018-1999011
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-23T15:29:00.347
Modified: 2019-05-23T11:29:01.503
Link: CVE-2018-1999011
JSON object: View
Redhat Information
No data.
CWE