#VU110612 Stack-based buffer overflow in FFmpeg - CVE-2009-4637
Published: May 20, 2010 / Updated: June 12, 2025
FFmpeg
ffmpeg.sourceforge.net
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing unknown vectors that trigger a stack-based buffer overflow. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html
- http://secunia.com/advisories/36805
- http://secunia.com/advisories/38643
- http://secunia.com/advisories/39482
- http://www.debian.org/security/2010/dsa-2000
- http://www.securityfocus.com/bid/36465
- http://www.ubuntu.com/usn/USN-931-1
- http://www.vupen.com/english/advisories/2010/0935
- https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240