CVE-2008-4867
https://notcve.org/view.php?id=CVE-2008-4867
Buffer overflow in libavcodec/dca.c in FFmpeg 0.4.9 before r14917, as used by MPlayer, allows context-dependent attackers to have an unknown impact via vectors related to an incorrect DCA_MAX_FRAME_SIZE value. Desbordamiento de búfer en libavcodec/dca.c en FFmpeg 0.4.9 antes de r14917, como es usado por MPlayer, permite a atacantes dependientes del contexto tener un impacto desconocido mediante vectores relacionados con un valor DCA_MAX_FRAME_SIZE incorrecto. • http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html http://secunia.com/advisories/34296 http://secunia.com/advisories/34385 http://security.gentoo.org/glsa/glsa-200903-33.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:013 http://www.mandriva.com/security/advisories?name=MDVSA-2009:014 http://www.mandriva.com/security/advisories?name=MDVSA-2009:015 http://www.openwall.com/lists • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4869
https://notcve.org/view.php?id=CVE-2008-4869
FFmpeg 0.4.9, as used by MPlayer, allows context-dependent attackers to cause a denial of service (memory consumption) via unknown vectors, aka a "Tcp/udp memory leak." FFmpeg 0.4.9, del modo que lo usa MPlayer, permite a atacantes dependientes del contexto provocar una denegación de servicio (agotamiento de memoria) mediante vectores desconocidos, también conocido como "Tcp/udp memory leak (fuga de memoria tcp/udp)". • http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html http://secunia.com/advisories/34385 http://security.gentoo.org/glsa/glsa-200903-33.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:297 http://www.openwall.com/lists/oss-security/2008/10/29/6 https://exchange.xforce.ibmcloud.com/vulnerabilities/46326 • CWE-399: Resource Management Errors •
CVE-2008-3162 – FFmpeg libavformat - 'psxstr.c' STR Data Heap Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-3162
Stack-based buffer overflow in the str_read_packet function in libavformat/psxstr.c in FFmpeg before r13993 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted STR file that interleaves audio and video sectors. Desbordamiento de búfer basado en pila en la función str_read_packet de libavformat/psxstr.c de FFmpeg anterior a r13993 , permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o ejecutar código de su elección mediante un fichero STR manipulado que intercala los sectores de audio y vídeo. • https://www.exploit-db.com/exploits/32019 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489965 http://secunia.com/advisories/30994 http://secunia.com/advisories/31268 http://secunia.com/advisories/34385 http://secunia.com/advisories/34905 http://security.gentoo.org/glsa/glsa-200903-33.xml http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=13993 http://www.debian.org/security/2009/dsa-1781 http://www.mandriva.com/security/advisories?name=MDVSA-2008:157 http://www.op • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •