header-logo
Suggest Exploit
vendor:
libavformat Library
by:
SecurityFocus
9.3
CVSS
HIGH
Heap-Based Buffer-Overflow
119
CWE
Product Name: libavformat Library
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Remote Heap-Based Buffer-Overflow Vulnerability in libavformat Library from FFmpeg

The 'libavformat' library from FFmpeg is prone to a remote heap-based buffer-overflow vulnerability because of insufficient boundary checks when parsing STR data. Remote attackers can exploit this issue by enticing victims into opening maliciously crafted STR files with an application that uses the affected library. Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service.

Mitigation:

Developers should ensure that boundary checks are performed when parsing STR data.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/30154/info

The 'libavformat' library from FFmpeg is prone to a remote heap-based buffer-overflow vulnerability because of insufficient boundary checks when parsing STR data.

Remote attackers can exploit this issue by enticing victims into opening maliciously crafted STR files with an application that uses the affected library.

Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32019.iki