Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://article.gmane.org/gmane.comp.video.ffmpeg.devel/122703 - Broken Link | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610550 - Issue Tracking, Third Party Advisory | |
References | () http://code.google.com/p/chromium/issues/detail?id=68115 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () http://codereview.chromium.org/5964011 - Patch, Vendor Advisory | |
References | () http://codereview.chromium.org/6069005 - Vendor Advisory | |
References | () http://ffmpeg.mplayerhq.hu/ - Third Party Advisory | |
References | () http://git.ffmpeg.org/?p=ffmpeg.git%3Ba=commit%3Bh=13184036a6b1b1d4b61c91118c0896e9ad4634c3 - | |
References | () http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html - Vendor Advisory | |
References | () http://osvdb.org/70463 - Broken Link | |
References | () http://roundup.ffmpeg.org/issue2548 - Broken Link | |
References | () http://roundup.ffmpeg.org/issue2550 - Broken Link | |
References | () http://secunia.com/advisories/42951 - Third Party Advisory | |
References | () http://src.chromium.org/viewvc/chrome?view=rev&revision=70200 - Broken Link | |
References | () http://www.debian.org/security/2011/dsa-2306 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:061 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/45788 - Third Party Advisory, VDB Entry | |
References | () http://www.srware.net/forum/viewtopic.php?f=18&t=2054 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/usn-1104-1/ - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/64671 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14380 - Third Party Advisory |
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2011-01-14 17:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0480
Mitre link : CVE-2011-0480
CVE.ORG link : CVE-2011-0480
JSON object : View
Products Affected
- chrome_os
- chrome
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')