exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Open Source CERT Security Advisory 2010.4

Open Source CERT Security Advisory 2010.4
Posted Sep 29, 2010
Authored by Andrea Barisani, Open Source CERT | Site ocert.org

The libavcodec library, an open source video encoding/decoding library part of the FFmpeg project, suffers from an arbitrary offset dereference vulnerability. The vulnerability affects the flic file format parser, insufficient restrictions on a writable buffer can be exploited to execute arbitrary code via the heap memory. A specific flic file can be crafted to trigger the vulnerability. Versions 0.6 and below are affected.

tags | advisory, arbitrary
advisories | CVE-2010-3429
SHA-256 | 91eb4e7bc98d45207f87d7999b2a67a127df42b8c0587aab9c0f0d5d54643137

Open Source CERT Security Advisory 2010.4

Change Mirror Download

#2010-004 FFmpeg/libavcodec arbitrary offset dereference

Description:

The libavcodec library, an open source video encoding/decoding library part of
the FFmpeg project, suffers from an arbitrary offset dereference vulnerability.

The vulnerability affects the flic file format parser, insufficient
restrictions on a writable buffer can be exploited to execute arbitrary code
via the heap memory. A specific flic file can be crafted to trigger the
vulnerability.

The MPlayer multimedia player is also affected as it statically includes
libavcodec, the flic codec can be disabled in codecs.conf configuration file in
order to workaround the issue.

Affected version:

libavcodec <= 0.6

MPlayer <= 1.0_rc3, snapshot 2010-09-27

Fixed version:

libavcodec >= r25223 (see References)

MPlayer >= snapshot 2010-09-28

Credit: vulnerability report and PoC code received from Cesar Bernardini <cesar
[dot] bernardini [at] gmail [dot] com> and Felipe Felipe Andres Manzano <felipe
[dot] andres [dot] manzano [at] gmail [dot] com>.

CVE: CVE-2010-3429

Timeline:

2010-08-24: vulnerability report received
2010-08-25: contacted mplayer maintainers
2010-08-27: mplayer security team confirms report, describes mplayer
workaround and points to ffmpeg as the originally affected package
2010-08-27: contacted ffmpeg maintainer
2010-08-27: preliminary patch is provided by ffmpeg maintainer
2010-08-28: reporter approves patch
2010-09-13: upstream confirms patch, two weeks embargo is proposed
2010-09-13: embargo accepted, contacted affected vendors
2010-09-27: patch committed to ffmpeg repository
2010-09-28: patch automatically pulled to mplayer repository from ffmpeg one
2010-09-28: oCERT advisory published

References:
http://git.ffmpeg.org/?p=ffmpeg;a=commitdiff;h=16c592155f117ccd7b86006c45aacc692a81c23b

Permalink:
http://www.ocert.org/advisories/ocert-2010-004.html

--
Andrea Barisani | Founder & Project Coordinator
oCERT | Open Source Computer Emergency Response Team

<lcars@ocert.org> http://www.ocert.org
0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
"Pluralitas non est ponenda sine necessitate"
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close