Short Name |
HTTP:STC:DL:FFMPEG-READ-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
FFmpeg vmd_read_header Integer Overflow |
Release Date |
2011/07/21 |
Update Number |
1959 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in FFmpeg. It is due to an integer overflow within the "vmd_read_header()" function in "libavformat/sierravmd.c". A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
FFmpeg is prone to a remote heap-based buffer-overflow vulnerability because of insufficient boundary checks when parsing STR data. Remote attackers can exploit this issue by enticing victims into opening maliciously crafted VMD files. Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. FFmpeg 0.5 is vulnerable; other versions may also be affected.