CVE-2017-14054
https://notcve.org/view.php?id=CVE-2017-14054
In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large "len" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop. En libavformat/rmdec.c en FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en ivr_read_header() al no haber un chequeo EOF (End Of File) que podría provocar acabar en un gran consumo de CPU. Cuando se envía un archivo IVR manipulado que reclama un campo "len" grande en la cabecera pero que no contiene suficientes datos de respaldo, el primer bucle type==4 consumiría una gran cantidad de recursos de CPU, ya que no hay ningún chequeo EOF en el bucle. • http://www.debian.org/security/2017/dsa-3996 http://www.securityfocus.com/bid/100627 https://github.com/FFmpeg/FFmpeg/commit/124eb202e70678539544f6268efc98131f19fa49 • CWE-834: Excessive Iteration •
CVE-2017-14055
https://notcve.org/view.php?id=CVE-2017-14055
In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop. En libavformat/mvdec.c in FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en mv_read_header() al no haber un chequeo EOF (End Of File) que podría provocar acabar en un gran consumo de CPU y de memoria. Cuando se envía un archivo MV manipulado que reclama un campo "nb_frames" grande en la cabecera pero que no contiene suficientes datos de respaldo, el bucle en los frames consumiría una gran cantidad de recursos de CPU y de memoria, ya que no hay ningún chequeo EOF en el bucle. • http://www.debian.org/security/2017/dsa-3996 http://www.securityfocus.com/bid/100626 https://github.com/FFmpeg/FFmpeg/commit/4f05e2e2dc1a89f38cd9f0960a6561083d714f1e https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html • CWE-834: Excessive Iteration •
CVE-2005-4048
https://notcve.org/view.php?id=CVE-2005-4048
Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes. • http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558 http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup http://secunia.com/advisories/17892 http://secunia.com/advisories/18066 http://secunia.com/advisories/18087 http://secunia.com/advisories/18107 http://secunia.com/advisories/18400 http://secunia.com/advisories/18739 http://secunia.com/advisories/18746 http://secunia.com/advisories/19114 http://secunia.com/advisories/19192 http://secunia • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •