Stack-based buffer overflow in FFmpeg - CVE-2009-4635
Published: October 26, 2011 / Updated: June 8, 2025
FFmpeg
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2009-4635
Sources
- http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html
- http://secunia.com/advisories/36805
- http://secunia.com/advisories/38643
- http://secunia.com/advisories/39482
- http://www.debian.org/security/2010/dsa-2000
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:059
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:060
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:061
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:088
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:112
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:114
- http://www.securityfocus.com/bid/36465
- http://www.ubuntu.com/usn/USN-931-1
- http://www.vupen.com/english/advisories/2010/0935
- http://www.vupen.com/english/advisories/2011/1241
- https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240