
CVE-2017-14169
https://notcve.org/view.php?id=CVE-2017-14169
07 Sep 2017 — In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value. En la función mxf_read_primer_pack en libavformat/mxfdec.c en FFmpeg versión 3.3.3 mayor a 2.4, podría ocurrir un error de firmas de enteros cuando se proporciona un archivo manipulado que reclame un cam... • http://www.debian.org/security/2017/dsa-3996 • CWE-20: Improper Input Validation •

CVE-2017-14170
https://notcve.org/view.php?id=CVE-2017-14170
07 Sep 2017 — In libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2017-14056
https://notcve.org/view.php?id=CVE-2017-14056
31 Aug 2017 — In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large "frame_count" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops. En libavformat/rl2.c in FFmpeg 3.3.3, se podría realizar un ataque de denegación de servi... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2017-14054
https://notcve.org/view.php?id=CVE-2017-14054
31 Aug 2017 — In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large "len" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop. En libavformat/rmdec.c en FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en ivr_read_header() al no haber un chequ... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2017-14055
https://notcve.org/view.php?id=CVE-2017-14055
31 Aug 2017 — In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop. En libavformat/mvdec.c in FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en mv_read_he... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2017-14057
https://notcve.org/view.php?id=CVE-2017-14057
31 Aug 2017 — In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops. En FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en asf_read_marker() al no haber ... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2017-14058
https://notcve.org/view.php?id=CVE-2017-14058
31 Aug 2017 — In FFmpeg 2.4 and 3.3.3, the read_data function in libavformat/hls.c does not restrict reload attempts for an insufficient list, which allows remote attackers to cause a denial of service (infinite loop). En FFmpeg versiones 2.4 y 3.3.3, la función read_data en libavformat/hls.c no restringe los intentos de recarga de una lista insuficiente, lo que permite a los atacantes remotos causar una denegación de servicio (bucle infinito) • http://www.debian.org/security/2017/dsa-3996 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2017-14059
https://notcve.org/view.php?id=CVE-2017-14059
31 Aug 2017 — In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop. En FFmpeg 3.3.3, se podría realizar un ataque de denegación de servicio en cine_read_header() al no haber un chequeo EOF (End Of File) qu... • http://www.debian.org/security/2017/dsa-3996 • CWE-834: Excessive Iteration •

CVE-2013-0870
https://notcve.org/view.php?id=CVE-2013-0870
28 Aug 2017 — The 'vp3_decode_frame' function in FFmpeg 1.1.4 moves threads check out of header packet type check. La función vp3_decode_frame en FFmpeg 1.1.4 no chequea los hilos cuando se chequea el tipo de paquete de cabecera. • http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=14c8ee00ffd9d45e6e0c6f11a957ce7e56f7eb3a •

CVE-2017-9608 – Debian Security Advisory 3957-1
https://notcve.org/view.php?id=CVE-2017-9608
28 Aug 2017 — The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. El decodificador dnxhd en FFmpeg, en versiones anteriores a la 3.2.6 y versiones 3.3.x anteriores a la 3.3.3, permite que atacantes remotos provoquen una denegación de servicio (desreferencia de puntero NULL) mediante un archivo mov manipulado. Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. T... • https://github.com/LaCinquette/practice-22-23 • CWE-476: NULL Pointer Dereference •