Page 15 of 74 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 84EXPL: 2

FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file. FFmpeg 2.x permite a atacantes remotos llevar a cabo ataques de origen cruzado y leer archivos arbitrarios usando el protocolo concat en un archivo HTTP Live Streaming (HLS) M3U8, dando lugar a una petición HTTP externa en la que la cadena URL contiene la primera línea de un archivo local. • http://habrahabr.ru/company/mailru/blog/274855 http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html http://security.stackexchange.com/questions/110644 http://www.debian.org/security/2016/dsa-3506 http://www.openwall.com/lists/oss-security/2016/01/14/1 http://www.securityfocus.com/bid/80501 http://www.securitytracker.com/id/1034932 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.529036 http://www.ubuntu.com/usn • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

The ff_get_buffer function in libavcodec/utils.c in FFmpeg before 2.8.4 preserves width and height values after a failure, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov file. La función ff_get_buffer en libavcodec/utils.c en FFmpeg en versiones anteriores a la 2.8.4 mantiene los valores de anchura y altura después de un fallo, lo que permite a atacantes remotos causar una denegación de servicio (acceso al array fuera de rango) o posiblemente tener otro impacto no especificad a través de un archivo .mov manipulado. • http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=abee0a1c60612e8638640a8a3738fffb65e16dbf http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html http://www.securitytracker.com/id/1034539 https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg before 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data. La función ff_dwt_decode en libavcodec/jpeg2000dwt.c en FFmpeg en versiones anteriores a la 2.8.4 no valida el número de niveles de descomposición antes de proceder con el descifrado Discrete Wavelet Transform, lo que permite a atacantes remotos causar una denegación de servicio (acceso al array fuera de rango) o posiblemente tener otro impacto no especificado a través de datos JPEG 2000 manipulados. • http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=75422280fbcdfbe9dc56bde5525b4d8b280f1bc5 http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html http://www.securitytracker.com/id/1034539 https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes. • http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558 http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup http://secunia.com/advisories/17892 http://secunia.com/advisories/18066 http://secunia.com/advisories/18087 http://secunia.com/advisories/18107 http://secunia.com/advisories/18400 http://secunia.com/advisories/18739 http://secunia.com/advisories/18746 http://secunia.com/advisories/19114 http://secunia.com/advisories/19192 http://secunia&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •