CVE-2006-4800
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in libavcodec in ffmpeg before 0.4.9_p20060530 allow remote attackers to cause a denial of service or possibly execute arbitrary code via multiple unspecified vectors in (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, and (13) tta.c. NOTE: it is likely that this is a different vulnerability than CVE-2005-4048 and CVE-2006-2802.
Múltiples desbordamientos de buffer en libavcodec en ffmpeg anterior a 0.4.9_p20060530 permite a un atacante remoto causar denegación de servicio o la posibilidad de ejecutar código de su elección a través de multiples vectores no especificados en (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, y (13) tta.c. NOTA: es probable que esta sea una vulnerabilidad diferente a la CVE-2005-4048 y CVE-2006-2802.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-09-14 CVE Reserved
- 2006-09-14 CVE Published
- 2023-08-26 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=133520 | X_refsource_misc | |
http://secunia.com/advisories/22180 | Third Party Advisory | |
http://secunia.com/advisories/22181 | Third Party Advisory | |
http://secunia.com/advisories/22182 | Third Party Advisory | |
http://secunia.com/advisories/22198 | Third Party Advisory | |
http://secunia.com/advisories/22200 | Third Party Advisory | |
http://secunia.com/advisories/22201 | Third Party Advisory | |
http://secunia.com/advisories/22202 | Third Party Advisory | |
http://secunia.com/advisories/22203 | Third Party Advisory | |
http://secunia.com/advisories/22230 | Third Party Advisory | |
http://secunia.com/advisories/23010 | Third Party Advisory | |
http://secunia.com/advisories/23213 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/21921 | 2018-10-30 | |
http://security.gentoo.org/glsa/glsa-200609-09.xml | 2018-10-30 | |
http://www.securityfocus.com/bid/20009 | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ffmpeg Search vendor "Ffmpeg" | Ffmpeg Search vendor "Ffmpeg" for product "Ffmpeg" | 0.4.6 Search vendor "Ffmpeg" for product "Ffmpeg" and version "0.4.6" | - |
Affected
| ||||||
Ffmpeg Search vendor "Ffmpeg" | Ffmpeg Search vendor "Ffmpeg" for product "Ffmpeg" | 0.4.7 Search vendor "Ffmpeg" for product "Ffmpeg" and version "0.4.7" | - |
Affected
| ||||||
Ffmpeg Search vendor "Ffmpeg" | Ffmpeg Search vendor "Ffmpeg" for product "Ffmpeg" | 0.4.8 Search vendor "Ffmpeg" for product "Ffmpeg" and version "0.4.8" | - |
Affected
| ||||||
Ffmpeg Search vendor "Ffmpeg" | Ffmpeg Search vendor "Ffmpeg" for product "Ffmpeg" | 0.4.9 Search vendor "Ffmpeg" for product "Ffmpeg" and version "0.4.9" | - |
Affected
|