FreeBSD : ffmpeg -- multiple vulnerabilities (b0da85af-21a3-4c15-a137-fe9e4bc86002)

high Nessus Plugin ID 87178
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.9

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

NVD reports :

The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.

The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain width and height checks, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.

The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data.

The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.

The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.2 does not enforce minimum-value and maximum-value constraints on tile coordinates, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.

The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via a crafted image with two or more of these markers.

Integer overflow in the ff_ivi_init_planes function in libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via crafted image dimensions in Indeo Video Interactive data.

The smka_decode_frame function in libavcodec/smacker.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Smacker data.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?df1a1bd8

http://www.nessus.org/u?863da8c9

http://www.nessus.org/u?f905b5c0

http://www.nessus.org/u?abf9f942

http://www.nessus.org/u?38aeb8a2

http://www.nessus.org/u?83fa2994

http://www.nessus.org/u?a9020836

http://www.nessus.org/u?a67cce36

https://ffmpeg.org/security.html

http://www.nessus.org/u?c18a0e41

Plugin Details

Severity: High

ID: 87178

File Name: freebsd_pkg_b0da85af21a34c15a137fe9e4bc86002.nasl

Version: 2.8

Type: local

Published: 12/3/2015

Updated: 1/6/2021

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:avidemux, p-cpe:/a:freebsd:freebsd:avidemux2, p-cpe:/a:freebsd:freebsd:avidemux26, p-cpe:/a:freebsd:freebsd:ffmpeg, p-cpe:/a:freebsd:freebsd:ffmpeg-011, p-cpe:/a:freebsd:freebsd:ffmpeg-devel, p-cpe:/a:freebsd:freebsd:ffmpeg0, p-cpe:/a:freebsd:freebsd:ffmpeg1, p-cpe:/a:freebsd:freebsd:ffmpeg2, p-cpe:/a:freebsd:freebsd:ffmpeg23, p-cpe:/a:freebsd:freebsd:ffmpeg24, p-cpe:/a:freebsd:freebsd:ffmpeg25, p-cpe:/a:freebsd:freebsd:ffmpeg26, p-cpe:/a:freebsd:freebsd:gstreamer-ffmpeg, p-cpe:/a:freebsd:freebsd:handbrake, p-cpe:/a:freebsd:freebsd:kodi, p-cpe:/a:freebsd:freebsd:libav, p-cpe:/a:freebsd:freebsd:mencoder, p-cpe:/a:freebsd:freebsd:mplayer, p-cpe:/a:freebsd:freebsd:mythtv, p-cpe:/a:freebsd:freebsd:mythtv-frontend, p-cpe:/a:freebsd:freebsd:plexhometheater, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/2/2015

Vulnerability Publication Date: 11/27/2015

Reference Information

CVE: CVE-2015-6761, CVE-2015-8216, CVE-2015-8217, CVE-2015-8218, CVE-2015-8219, CVE-2015-8363, CVE-2015-8364, CVE-2015-8365