User: Password:
|
|
Subscribe / Log in / New account

Mandriva alert MDVSA-2012:076 (ffmpeg)

From:  security@mandriva.com
To:  security-announce@mandrivalinux.org
Subject:  [Security Announce] [ MDVSA-2012:076 ] ffmpeg
Date:  Tue, 15 May 2012 15:28:01 +0200
Message-ID:  <E1SUHnG-0006ic-2M@titan.mandriva.com>
Archive-link:  Article, Thread

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:076 http://www.mandriva.com/security/ _______________________________________________________________________ Package : ffmpeg Date : May 15, 2012 Affected: 2011. _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in ffmpeg: The Matroska format decoder in FFmpeg does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted file (CVE-2011-3362, CVE-2011-3504). cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, related to the decode_residual_block, check_for_slice, and cavs_decode_frame functions, a different vulnerability than CVE-2011-3362 (CVE-2011-3973). Integer signedness error in the decode_residual_inter function in cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, a different vulnerability than CVE-2011-3362 (CVE-2011-3974). Double free vulnerability in the Theora decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3892). FFmpeg does not properly implement the MKV and Vorbis media handlers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors (CVE-2011-3893). Heap-based buffer overflow in the Vorbis decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3895). An error within the QDM2 decoder (libavcodec/qdm2.c) can be exploited to cause a buffer overflow (CVE-2011-4351). An integer overflow error within the &quot;vp3_dequant()&quot; function (libavcodec/vp3.c) can be exploited to cause a buffer overflow (CVE-2011-4352). Errors within the &quot;av_image_fill_pointers()&quot;, the &quot;vp5_parse_coeff()&quot;, and the &quot;vp6_parse_coeff()&quot; functions can be exploited to trigger out-of-bounds reads (CVE-2011-4353). It was discovered that Libav incorrectly handled certain malformed VMD files. If a user were tricked into opening a crafted VMD file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4364). It was discovered that Libav incorrectly handled certain malformed SVQ1 streams. If a user were tricked into opening a crafted SVQ1 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4579). Multiple input validations in the decoders/ demuxers for Westwood Studios VQA, Apple MJPEG-B, Theora, Matroska, Vorbis, Sony ATRAC3, DV, NSV, files could lead to the execution of arbitrary code (CVE-2011-3929, CVE-2011-3936, CVE-2011-3937, CVE-2011-3940, CVE-2011-3945, CVE-2011-3947, CVE-2012-0853, CVE-2012-0858). The updated packages have been upgraded to the 0.7.12 version where these issues has been corrected. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3362 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3504 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3892 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3893 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3895 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3929 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3936 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3940 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3945 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3947 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4351 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4579 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0853 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0858 http://ffmpeg.org/security.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2011: 406a90f3c3aa705f38d562d48e295e03 2011/i586/ffmpeg-0.7.12-0.1-mdv2011.0.i586.rpm 32129d580b8038edbf9895ec4d7b2fcb 2011/i586/libavfilter1-0.7.12-0.1-mdv2011.0.i586.rpm b7f175f1035f4067c9cb94281833180b 2011/i586/libavformats52-0.7.12-0.1-mdv2011.0.i586.rpm 353614e9f64b6ae0d872d68183de1702 2011/i586/libavutil50-0.7.12-0.1-mdv2011.0.i586.rpm d8f5981968b0b6fa6533ff1c0fff3b21 2011/i586/libffmpeg52-0.7.12-0.1-mdv2011.0.i586.rpm 8afc2be1abb99a531dc264d2c2ca06f2 2011/i586/libffmpeg-devel-0.7.12-0.1-mdv2011.0.i586.rpm 3388b38d883111b7a9690c6b6e5642cd 2011/i586/libffmpeg-static-devel-0.7.12-0.1-mdv2011.0.i586.rpm eab9abe8ff0c3c8f70e0835ff5d86a16 2011/i586/libpostproc51-0.7.12-0.1-mdv2011.0.i586.rpm 56412a9d476c3afa6eddfb2213197aef 2011/i586/libswscaler0-0.7.12-0.1-mdv2011.0.i586.rpm 5c84c76529690066d76d0ab23dcd7c18 2011/SRPMS/ffmpeg-0.7.12-0.1.src.rpm Mandriva Linux 2011/X86_64: 48d4a2512c540a98a442a9c1d502967e 2011/x86_64/ffmpeg-0.7.12-0.1-mdv2011.0.x86_64.rpm d2317215c418f1dc2bbd5501ded9dfa8 2011/x86_64/lib64avfilter1-0.7.12-0.1-mdv2011.0.x86_64.rpm 7cce3f5255ff1c8443e915fd9dd0cc40 2011/x86_64/lib64avformats52-0.7.12-0.1-mdv2011.0.x86_64.rpm 39cb1e16f40dd1c3c7a4eefd4099c5a0 2011/x86_64/lib64avutil50-0.7.12-0.1-mdv2011.0.x86_64.rpm 374bf64c3811af7b1f7c87e614bba01e 2011/x86_64/lib64ffmpeg52-0.7.12-0.1-mdv2011.0.x86_64.rpm c7630d17e83608a9b9b11a62acbf55db 2011/x86_64/lib64ffmpeg-devel-0.7.12-0.1-mdv2011.0.x86_64.rpm ed5b7e42dcf2ef78b073251286fda9a9 2011/x86_64/lib64ffmpeg-static-devel-0.7.12-0.1-mdv2011.0.x86_64.rpm 4e380177dd301bca6b706eacc7a8e36b 2011/x86_64/lib64postproc51-0.7.12-0.1-mdv2011.0.x86_64.rpm 73493c74c9eb57107a9ff5451da1352e 2011/x86_64/lib64swscaler0-0.7.12-0.1-mdv2011.0.x86_64.rpm 5c84c76529690066d76d0ab23dcd7c18 2011/SRPMS/ffmpeg-0.7.12-0.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFPsi5+mqjQ0CJFipgRAogYAJ96K96aQ36yK6iyvQBN9FBjrId9fQCgmfbV Y2UGj6k2AZMMFUionJ5h+fc= =4jQk -----END PGP SIGNATURE----- To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds