CVE-2014-4609
Mandriva Linux Security Advisory 2014-129
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
Un desbordamiento de enteros en la función get_len en el archivo libavutil/lzo.c en Libav versiones anteriores a 0.8.13, versiones 9.x anteriores a 9.14 y versiones 10.x anteriores a 10.2, permite a atacantes remotos ejecutar código arbitrario por medio de una Ejecución Literal diseñada.
Multiple unspecified vulnerabilities in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 have unknown impact and attack vectors related to in decode_ac_filter, and (3) too many bits in decode_channel_residues(). libavcodec/wmalosslessdec.c in FFmpeg before 2.1.4 uses an incorrect data-structure size for certain coefficients, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted WMA data. The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Microsoft RLE video data. The mpegts_write_pmt function in the MPEG2 transport stream muxer in FFmpeg, possibly 2.1 and earlier, allows remote attackers to have unspecified impact and vectors, which trigger an out-of-bounds write. A use-after-free vulnerability in FFmpeg before 1.1.9 involving seek operations on video data could allow remote attackers to cause a denial of service. An integer overflow can occur when processing any variant of a literal run in the av_lzo1x_decode function. The updated packages have been upgraded to the 0.10.14 version which is not vulnerable to these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-06-23 CVE Reserved
- 2014-07-09 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/06/26/22 | Mailing List |
|
URL | Date | SRC |
---|---|---|
http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://libav.org/news/#2014-06-27 | 2020-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libav Search vendor "Libav" | Libav Search vendor "Libav" for product "Libav" | < 0.8.13 Search vendor "Libav" for product "Libav" and version " < 0.8.13" | - |
Affected
| ||||||
Libav Search vendor "Libav" | Libav Search vendor "Libav" for product "Libav" | >= 9.0 < 9.14 Search vendor "Libav" for product "Libav" and version " >= 9.0 < 9.14" | - |
Affected
| ||||||
Libav Search vendor "Libav" | Libav Search vendor "Libav" for product "Libav" | >= 10.0 < 10.2 Search vendor "Libav" for product "Libav" and version " >= 10.0 < 10.2" | - |
Affected
|