---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: ffmpeg Multiple Vulnerabilities SECUNIA ADVISORY ID: SA36805 VERIFY ADVISORY: http://secunia.com/advisories/36805/ DESCRIPTION: Some vulnerabilities have been discovered in ffmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. 1) Multiple NULL-pointer dereference and division by zero errors when parsing ".ogv" and ".wmv" files can be exploited to cause a crash. 2) Multiple NULL-pointer dereference and division by zero errors when parsing AVI files can be exploited to cause a crash. 3) Multiple errors when processing ".ogv" files and "mjpg" encoded AVI files can be exploited to dereference invalid memory and cause a crash. 4) An error when processing "iv32" encoded AVI files can be exploited to corrupt heap memory and potentially execute arbitrary code. 5) An error when processing ".ogv" files can be exploited to trigger the execution of an infinite loop. 6) An error when processing "h264" encoded AVI files can be exploited to trigger a floating point exception. 7) An error when parsing MOV atoms can be exploited to trigger a NULL-pointer dereference. 8) An error when processing ".mp4" files can be exploited to corrupt heap memory and potentially execute arbitrary code. 9) An error in the AAC codec can be exploited to trigger an out-of-bounds read and cause a crash. 10) An error in the "mov_read_dref()" function can be exploited to cause a hang via a specially crafted ".mp4" file. 11) An error in the processing of ".ogv" files can be exploited to corrupt memory and potentially execute arbitrary code. The vulnerabilities are confirmed in version 0.5. Other versions may also be affected. SOLUTION: Do not process untrusted files. Some vulnerabilities are fixed in the SVN repository. PROVIDED AND/OR DISCOVERED BY: 1-4) Reported by Will Dormann in an ffmpeg bug report. 5-11) Reported via patches committed to the chromium development repository. ORIGINAL ADVISORY: Will Dormann: https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240 Chromium: http://src.chromium.org/viewvc/chrome/trunk/deps/third_party/ffmpeg/?view=log ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------