lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <7E45577E4E72EC42BB3F8560D57E755145A2B56A@manexchprd01> Date: Wed, 23 Nov 2011 14:14:51 +0000 From: "Research@...Secure" <research@...secure.com> To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com> Subject: NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution High Risk Vulnerability in FFmpeg 23 November 2011 Phillip Langlois of NGS Secure has discovered a High risk vulnerability in FFmpeg Impact: Remote code execution Versions affected include: FFmpeg < 0.7.8 This issue is addressed in v 0.7.8 and v0.8.7, which can be downloaded at: http://ffmpeg.org/download.html#release_0.7 NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure. NGS Secure Research http://www.ngssecure.com
Powered by blists - more mailing lists