FreeBSD : ffmpeg -- libavcodec buffer overflow vulnerability (964161cd-6715-11da-99f6-00123ffe8333)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Simon Kilvington has reported a vulnerability in FFmpeg libavcodec,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system.

The vulnerability is caused due to a boundary error in the
'avcodec_default_get_buffer()' function of 'utils.c' in libavcodec.
This can be exploited to cause a heap-based buffer overflow when a
specially crafted 1x1 '.png' file containing a palette is read.

See also :

http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
http://www.nessus.org/u?317fb12a

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21479 (freebsd_pkg_964161cd671511da99f600123ffe8333.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now