lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1STztE-0001sa-M8@titan.mandriva.com>
Date: Mon, 14 May 2012 20:21:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:074 ] ffmpeg

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:074
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : ffmpeg
 Date    : May 14, 2012
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in ffmpeg:
 
 The Matroska format decoder in FFmpeg does not properly allocate
 memory, which allows remote attackers to execute arbitrary code via
 a crafted file (CVE-2011-3362, CVE-2011-3504).
 
 cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause
 a denial of service (incorrect write operation and application
 crash) via an invalid bitstream in a Chinese AVS video (aka CAVS)
 file, related to the decode_residual_block, check_for_slice,
 and cavs_decode_frame functions, a different vulnerability than
 CVE-2011-3362 (CVE-2011-3973).
 
 Integer signedness error in the decode_residual_inter function in
 cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a
 denial of service (incorrect write operation and application crash)
 via an invalid bitstream in a Chinese AVS video (aka CAVS) file,
 a different vulnerability than CVE-2011-3362 (CVE-2011-3974).
 
 FFmpeg does not properly implement the MKV and Vorbis media
 handlers, which allows remote attackers to cause a denial of service
 (out-of-bounds read) via unspecified vectors (CVE-2011-3893).
 
 Heap-based buffer overflow in the Vorbis decoder in FFmpeg allows
 remote attackers to cause a denial of service or possibly have
 unspecified other impact via a crafted stream (CVE-2011-3895).
 
 An error within the QDM2 decoder (libavcodec/qdm2.c) can be exploited
 to cause a buffer overflow (CVE-2011-4351).
 
 An integer overflow error within the &quot;vp3_dequant()&quot; function
 (libavcodec/vp3.c) can be exploited to cause a buffer overflow
 (CVE-2011-4352).
 
 Errors within the &quot;av_image_fill_pointers()&quot;, the &quot;vp5_parse_coeff()&quot;,
 and the &quot;vp6_parse_coeff()&quot; functions can be exploited to trigger
 out-of-bounds reads (CVE-2011-4353).
 
 It was discovered that Libav incorrectly handled certain malformed
 VMD files. If a user were tricked into opening a crafted VMD file,
 an attacker could cause a denial of service via application crash,
 or possibly execute arbitrary code with the privileges of the user
 invoking the program (CVE-2011-4364).
 
 It was discovered that Libav incorrectly handled certain malformed SVQ1
 streams. If a user were tricked into opening a crafted SVQ1 stream
 file, an attacker could cause a denial of service via application
 crash, or possibly execute arbitrary code with the privileges of the
 user invoking the program (CVE-2011-4579).
 
 The updated packages have been upgraded to the 0.5.9 version where
 these issues has been corrected.
 
 Additionally a couple of packages needed to be rebuilt for the new
 ffmpeg version and is also being provided with this advisory.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3362
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3504
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3973
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3974
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3893
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3895
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4351
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4352
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4353
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4364
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4579
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 0fdb49826f72c882160194a2b69a5c87  mes5/i586/alsa-plugins-doc-1.0.18-1.3mdvmes5.2.i586.rpm
 a9184e748cedd56e29a8e8f8320e8e7f  mes5/i586/alsa-plugins-pulse-config-1.0.18-1.3mdvmes5.2.i586.rpm
 a2cd850d45fc78fbfbaaa1b5f1f26cb3  mes5/i586/ffmpeg-0.5.9-0.1mdvmes5.2.i586.rpm
 934e1dc981e21c900b061d35ff4f07f8  mes5/i586/libalsa-plugins-1.0.18-1.3mdvmes5.2.i586.rpm
 35cf79d3b7d0bed70062490c234a3a96  mes5/i586/libalsa-plugins-jack-1.0.18-1.3mdvmes5.2.i586.rpm
 463cc419b2884f4679b892178a3a337b  mes5/i586/libalsa-plugins-pulseaudio-1.0.18-1.3mdvmes5.2.i586.rpm
 5a4fbe9f761a13d68dbd2a21eb16b792  mes5/i586/libavformats52-0.5.9-0.1mdvmes5.2.i586.rpm
 26962af25fa57974623890fb3677fd7f  mes5/i586/libavutil49-0.5.9-0.1mdvmes5.2.i586.rpm
 d763fdf58e3df9e1f983f9b3fca0b5dc  mes5/i586/libffmpeg52-0.5.9-0.1mdvmes5.2.i586.rpm
 001f3283c3e5c4613b27eb2e0e16c67e  mes5/i586/libffmpeg-devel-0.5.9-0.1mdvmes5.2.i586.rpm
 beab6d8b916aee5612dd19d911baeb28  mes5/i586/libffmpeg-static-devel-0.5.9-0.1mdvmes5.2.i586.rpm
 aeebaae0004f02a4d93251449dcb4a32  mes5/i586/libpostproc51-0.5.9-0.1mdvmes5.2.i586.rpm
 f1316e064b6a1eee639db109e6d914cb  mes5/i586/libsox1-14.3.0-0.1mdvmes5.2.i586.rpm
 d3ada9d56563250589ae5ebf0965c9f0  mes5/i586/libsox-devel-14.3.0-0.1mdvmes5.2.i586.rpm
 1142b3b17f5111d1461bf903433d48fc  mes5/i586/libswscaler0-0.5.9-0.1mdvmes5.2.i586.rpm
 f8b48a8125687623eafc58ea85576138  mes5/i586/sox-14.3.0-0.1mdvmes5.2.i586.rpm 
 ebbc02efc1cecabcd1bc690c037f6661  mes5/SRPMS/alsa-plugins-1.0.18-1.3mdvmes5.2.src.rpm
 234640efe0b95b9024908b7288b32e8b  mes5/SRPMS/ffmpeg-0.5.9-0.1mdvmes5.2.src.rpm
 15fc65b510c9db52c6a1a24eb8757543  mes5/SRPMS/sox-14.3.0-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 9f84db2778fc1f811bada3de7b6d4bfa  mes5/x86_64/alsa-plugins-doc-1.0.18-1.3mdvmes5.2.x86_64.rpm
 1d59606b054a936336eaccf54873d81d  mes5/x86_64/alsa-plugins-pulse-config-1.0.18-1.3mdvmes5.2.x86_64.rpm
 50b0809d47ff5a08a390732ab8e0a933  mes5/x86_64/ffmpeg-0.5.9-0.1mdvmes5.2.x86_64.rpm
 088e6dc595a71490d6d9f46e558a6726  mes5/x86_64/lib64alsa-plugins-1.0.18-1.3mdvmes5.2.x86_64.rpm
 37fda2dabd87de004441841b59d391b5  mes5/x86_64/lib64alsa-plugins-jack-1.0.18-1.3mdvmes5.2.x86_64.rpm
 734ccbb72c0f4fd4202e1d2479b3b00c  mes5/x86_64/lib64alsa-plugins-pulseaudio-1.0.18-1.3mdvmes5.2.x86_64.rpm
 6d2178f975d930a5824ef91020fc1cdb  mes5/x86_64/lib64avformats52-0.5.9-0.1mdvmes5.2.x86_64.rpm
 ca395249e3f8c7d1f5e63ffe71302cc0  mes5/x86_64/lib64avutil49-0.5.9-0.1mdvmes5.2.x86_64.rpm
 6d6fe319ed45c1699432b88032ebc3b1  mes5/x86_64/lib64ffmpeg52-0.5.9-0.1mdvmes5.2.x86_64.rpm
 e4ede05f09b5f59c0f672ec2aa5dc699  mes5/x86_64/lib64ffmpeg-devel-0.5.9-0.1mdvmes5.2.x86_64.rpm
 96c86a1f1d85a5e30c319f4f16879a5c  mes5/x86_64/lib64ffmpeg-static-devel-0.5.9-0.1mdvmes5.2.x86_64.rpm
 0887b3218482cac483f3d71c93172cad  mes5/x86_64/lib64postproc51-0.5.9-0.1mdvmes5.2.x86_64.rpm
 32929df8af1400096cc801bdee36e6c9  mes5/x86_64/lib64sox1-14.3.0-0.1mdvmes5.2.x86_64.rpm
 22485b182e669a22f875d0103729a25c  mes5/x86_64/lib64sox-devel-14.3.0-0.1mdvmes5.2.x86_64.rpm
 4a9dfb1bae4462e53da91d4f3b055a70  mes5/x86_64/lib64swscaler0-0.5.9-0.1mdvmes5.2.x86_64.rpm
 de5b1e5a5160ac8df7c4727887b00ec6  mes5/x86_64/sox-14.3.0-0.1mdvmes5.2.x86_64.rpm 
 ebbc02efc1cecabcd1bc690c037f6661  mes5/SRPMS/alsa-plugins-1.0.18-1.3mdvmes5.2.src.rpm
 234640efe0b95b9024908b7288b32e8b  mes5/SRPMS/ffmpeg-0.5.9-0.1mdvmes5.2.src.rpm
 15fc65b510c9db52c6a1a24eb8757543  mes5/SRPMS/sox-14.3.0-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPsSFpmqjQ0CJFipgRAgBuAKDx4qPO9FrgQm+FZ9hUsH7CE+Y4bgCfbO/u
8bhswyhduXBF2NKD7WKctYg=
=4G2y
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ