CVE-2009-4635
Publication date 9 February 2010
Last updated 24 July 2024
Ubuntu priority
FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
ffmpeg | 10.10 maverick |
Not affected
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
9.04 jaunty | Ignored end of life | |
8.10 intrepid | Ignored end of life, was needed | |
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper | Ignored end of life | |
ffmpeg-debian | 10.10 maverick | Not in release |
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release |
Notes
kees
stack-protected on Edgy and later, just a DoS
mdeslaur
This is issue #22 The patch for this issue has not been commited by upstream into the 5.x branch. I could not reproduce the issue with 5.x and the google reproducer. The patch included in usn-931-1 caused a regression, so was removed in usn-931-2.