Heap-based buffer overflow in FFmpeg - CVE-2012-0947
Published: August 20, 2012 / Updated: July 28, 2020
FFmpeg
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2. A remote attacker can use a crafted VQA media file in which the image size is not a multiple of the block size. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-0947
Sources
- http://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
- http://libav.org/
- http://secunia.com/advisories/49089
- http://www.debian.org/security/2012/dsa-2471
- http://www.openwall.com/lists/oss-security/2012/05/03/4
- http://www.securityfocus.com/bid/53389
- http://www.ubuntu.com/usn/USN-1479-1
- https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963