Rapid7 Vulnerability & Exploit Database

FFmpeg: CVE-2013-0894: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Back to Search

FFmpeg: CVE-2013-0894: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
02/23/2013
Created
07/25/2018
Added
09/29/2017
Modified
09/30/2020

Description

Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg through 1.1.3, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds array access) or possibly have unspecified other impact via vectors involving a zero value for a bark map size.

Solution(s)

  • ffmpeg-upgrade-0_10_7
  • ffmpeg-upgrade-0_7_16
  • ffmpeg-upgrade-0_8_15
  • ffmpeg-upgrade-0_9_4
  • ffmpeg-upgrade-1_0_10
  • ffmpeg-upgrade-1_1_4
  • ffmpeg-upgrade-1_2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;