#VU32145 Heap-based buffer overflow in FFmpeg - CVE-2016-10190
Published: February 9, 2017 / Updated: October 6, 2022
FFmpeg
ffmpeg.sourceforge.net
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2. A remote attacker can use a negative chunk size in an HTTP response. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://www.openwall.com/lists/oss-security/2017/01/31/12
- http://www.openwall.com/lists/oss-security/2017/02/02/1
- http://www.securityfocus.com/bid/95986
- https://ffmpeg.org/security.html
- https://github.com/FFmpeg/FFmpeg/commit/2a05c8f813de6f2278827734bf8102291e7484aa
- https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html
- https://trac.ffmpeg.org/ticket/5992