Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-4635

Published: 9 February 2010

FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow.

Notes

AuthorNote
kees
stack-protected on Edgy and later, just a DoS
mdeslaur
This is issue #22
The patch for this issue has not been commited by upstream
into the 5.x branch. I could not reproduce the issue with
5.x and the google reproducer. The patch included in usn-931-1
caused a regression, so was removed in usn-931-2.

Priority

Low

Status

Package Release Status
ffmpeg
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy Not vulnerable
(could not reproduce)
intrepid Ignored
(end of life, was needed)
jaunty Ignored
(end of life)
karmic Not vulnerable
(could not reproduce)
lucid Not vulnerable
(4:0.5.1-1ubuntu1)
maverick Not vulnerable
(4:0.5.1-1ubuntu1)
upstream Needed

ffmpeg-debian
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

intrepid Not vulnerable
(could not reproduce)
jaunty Not vulnerable
(could not reproduce)
karmic Does not exist

lucid Does not exist

maverick Does not exist

upstream Needed