FFmpeg 0.5 allows remote attackers to cause a denial of service and
possibly execute arbitrary code via a crafted MOV container with improperly
ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec
types and identifiers, leading to processing of a video-structure pointer
by the mp3 decoder, and a stack-based buffer overflow.
kees> stack-protected on Edgy and later, just a DoS
mdeslaur> This is issue #22
mdeslaur> The patch for this issue has not been commited by upstream
mdeslaur> into the 5.x branch. I could not reproduce the issue with
mdeslaur> 5.x and the google reproducer. The patch included in usn-931-1
mdeslaur> caused a regression, so was removed in usn-931-2.
|Ubuntu 8.04 LTS (Hardy Heron):||DNE
|Ubuntu 10.04 LTS (Lucid Lynx):||DNE
|Ubuntu 11.04 (Natty Narwhal):||DNE
Updated: 2012-06-01 15:20:29 UTC (commit 5347)