Your submission was sent successfully! Close

CVE-2016-1897

Published: 14 January 2016

FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.

From the Ubuntu security team

It was discovered that Libav incorrectly handled certain media files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
ffmpeg
Launchpad, Ubuntu, Debian
artful
Released (7:2.8.6-1ubuntu1)
bionic
Released (7:2.8.6-1ubuntu1)
cosmic
Released (7:2.8.6-1ubuntu1)
disco
Released (7:2.8.6-1ubuntu1)
precise Does not exist

trusty Does not exist

upstream
Released (2.8.5,2.7.5,2.6.7,2.5.10)
vivid Ignored
(reached end-of-life)
wily
Released (7:2.7.5-0ubuntu0.15.10.1)
xenial
Released (7:2.8.6-1ubuntu1)
yakkety
Released (7:2.8.6-1ubuntu1)
zesty
Released (7:2.8.6-1ubuntu1)
libav
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

disco Does not exist

precise Does not exist
(precise was released [4:0.8.17-0ubuntu0.12.04.2])
trusty Does not exist
(trusty was needed)
upstream Needs triage

vivid Ignored
(reached end-of-life)
wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist