HTTP: FFmpeg vmd_read_header Integer Overflow

This signature detects attempts to exploit a known vulnerability in FFmpeg. It is due to an integer overflow within the "vmd_read_header()" function in "libavformat/sierravmd.c". A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

FFmpeg is prone to a remote heap-based buffer-overflow vulnerability because of insufficient boundary checks when parsing STR data. Remote attackers can exploit this issue by enticing victims into opening maliciously crafted VMD files. Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. FFmpeg 0.5 is vulnerable; other versions may also be affected.

Affected Products

Pardus linux_2009

References

BugTraq: 36419

Short Name
HTTP:STC:DL:FFMPEG-READ-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
FFmpeg Integer Overflow bid:36419 vmd_read_header
Release Date
07/21/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Ffmpeg

Pardus

Found a potential security threat?