CVE-2014-4610

MEDIUM

Description

Integer overflow in the get_len function in libavutil/lzo.c in FFmpeg before 0.10.14, 1.1.x before 1.1.12, 1.2.x before 1.2.7, 2.0.x before 2.0.5, 2.1.x before 2.1.5, and 2.2.x before 2.2.4 allows remote attackers to execute arbitrary code via a crafted Literal Run.

References

http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html

http://www.openwall.com/lists/oss-security/2014/06/26/23

https://www.ffmpeg.org/security.html

Details

Source: MITRE

Published: 2020-01-14

Updated: 2020-01-21

Type: CWE-190

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH

Tenable Plugins

View all (4 total)

IDNameProductFamilySeverity
82449Mandriva Linux Security Advisory : ffmpeg (MDVSA-2015:173)NessusMandriva Local Security Checks
high
76437Mandriva Linux Security Advisory : ffmpeg (MDVSA-2014:129)NessusMandriva Local Security Checks
critical
76302FreeBSD : mplayer -- potential buffer overrun when processing malicious lzo compressed input (9ab3a22c-feb8-11e3-b938-5404a68ad561)NessusFreeBSD Local Security Checks
medium
76301FreeBSD : mencoder -- potential buffer overrun when processing malicious lzo compressed input (17dfd984-feba-11e3-b938-5404a68ad561)NessusFreeBSD Local Security Checks
medium