In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops.
References
Configurations
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3996 - | |
References | () http://www.securityfocus.com/bid/100630 - | |
References | () https://github.com/FFmpeg/FFmpeg/commit/7f9ec5593e04827249e7aeb466da06a98a0d7329 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html - |
Information
Published : 2017-08-31 15:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14057
Mitre link : CVE-2017-14057
CVE.ORG link : CVE-2017-14057
JSON object : View
Products Affected
ffmpeg
- ffmpeg
CWE
CWE-834
Excessive Iteration