The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://trac.ffmpeg.org/ticket/2922 | |
https://security.gentoo.org/glsa/201603-06 | vendor advisory |
http://ffmpeg.org/security.html | |
http://openwall.com/lists/oss-security/2013/12/08/3 | mailing list patch |
https://github.com/FFmpeg/FFmpeg/commit/821a5938d100458f4d09d634041b05c860554ce0 | patch exploit |
http://openwall.com/lists/oss-security/2013/11/26/7 | mailing list patch |