The get_cox function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not properly validate the reduction factor, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG2000 data.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://trac.ffmpeg.org/ticket/2898 | exploit |
https://github.com/FFmpeg/FFmpeg/commit/a1b9004b768bef606ee98d417bceb9392ceb788d | patch exploit |
https://security.gentoo.org/glsa/201603-06 | vendor advisory |
http://ffmpeg.org/security.html | |
http://openwall.com/lists/oss-security/2013/12/08/3 | mailing list patch |
http://openwall.com/lists/oss-security/2013/11/26/7 | mailing list patch |