FFmpeg 0.5 allows remote attackers to cause a denial of service (hang) via a crafted file that triggers an infinite loop.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:088 | vendor advisory |
http://secunia.com/advisories/36805 | third party advisory |
http://www.securityfocus.com/bid/36465 | vdb entry |
https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:061 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:062 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:112 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:114 | vendor advisory |
http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html | patch exploit |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:089 | vendor advisory |
http://secunia.com/advisories/38643 | third party advisory |
http://www.vupen.com/english/advisories/2011/1241 | vdb entry |
http://www.debian.org/security/2010/dsa-2000 | vendor advisory |