Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:FFMPEG-READ-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

FFmpeg vmd_read_header Integer Overflow

Release Date

2011/07/21

Update Number

1959

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: FFmpeg vmd_read_header Integer Overflow


This signature detects attempts to exploit a known vulnerability in FFmpeg. It is due to an integer overflow within the "vmd_read_header()" function in "libavformat/sierravmd.c". A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

FFmpeg is prone to a remote heap-based buffer-overflow vulnerability because of insufficient boundary checks when parsing STR data. Remote attackers can exploit this issue by enticing victims into opening maliciously crafted VMD files. Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. FFmpeg 0.5 is vulnerable; other versions may also be affected.

Affected Products

  • FFmpeg 0.5
  • Pardus Linux 2009

References

  • BugTraq: 36419

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out