CVE-2013-7020

The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not properly enforce certain bit-count and colorspace constraints, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:0.11:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.0:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.2:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://ffmpeg.org/security.html - Vendor Advisory () http://ffmpeg.org/security.html - Vendor Advisory
References () http://openwall.com/lists/oss-security/2013/11/26/7 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2013/11/26/7 - Mailing List, Patch, Third Party Advisory
References () http://openwall.com/lists/oss-security/2013/12/08/3 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2013/12/08/3 - Mailing List, Patch, Third Party Advisory
References () http://secunia.com/advisories/61389 - () http://secunia.com/advisories/61389 -
References () http://www.debian.org/security/2014/dsa-3027 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3027 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:227 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2014:227 - Broken Link
References () https://github.com/FFmpeg/FFmpeg/commit/b05cd1ea7e45a836f7f6071a716c38bb30326e0f - Patch, Issue Tracking () https://github.com/FFmpeg/FFmpeg/commit/b05cd1ea7e45a836f7f6071a716c38bb30326e0f - Issue Tracking, Patch
References () https://security.gentoo.org/glsa/201603-06 - () https://security.gentoo.org/glsa/201603-06 -

Information

Published : 2013-12-09 16:36

Updated : 2024-11-21 02:00


NVD link : CVE-2013-7020

Mitre link : CVE-2013-7020

CVE.ORG link : CVE-2013-7020


JSON object : View

Products Affected

debian

  • debian_linux

ffmpeg

  • ffmpeg
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer