ID CVE-2017-14057
Summary In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops.
References
Vulnerable Configurations
  • cpe:2.3:a:ffmpeg:ffmpeg:3.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:ffmpeg:ffmpeg:3.3.3:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE CWE-834
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
refmap via4
bid 100630
confirm https://github.com/FFmpeg/FFmpeg/commit/7f9ec5593e04827249e7aeb466da06a98a0d7329
debian DSA-3996
mlist [debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update
Last major update 03-10-2019 - 00:03
Published 31-08-2017 - 15:29
Last modified 03-10-2019 - 00:03
Back to Top