10 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.033 Low
EPSS
Percentile
91.4%
Multiple vulnerabilities has been found and corrected in ffmpeg :
The Matroska format decoder in FFmpeg does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted file (CVE-2011-3362, CVE-2011-3504).
cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, related to the decode_residual_block, check_for_slice, and cavs_decode_frame functions, a different vulnerability than CVE-2011-3362 (CVE-2011-3973).
Integer signedness error in the decode_residual_inter function in cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, a different vulnerability than CVE-2011-3362 (CVE-2011-3974).
Double free vulnerability in the Theora decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3892).
FFmpeg does not properly implement the MKV and Vorbis media handlers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors (CVE-2011-3893).
Heap-based buffer overflow in the Vorbis decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3895).
An error within the QDM2 decoder (libavcodec/qdm2.c) can be exploited to cause a buffer overflow (CVE-2011-4351).
An integer overflow error within the ‘vp3_dequant()’ function (libavcodec/vp3.c) can be exploited to cause a buffer overflow (CVE-2011-4352).
Errors within the ‘av_image_fill_pointers()’, the ‘vp5_parse_coeff()’, and the ‘vp6_parse_coeff()’ functions can be exploited to trigger out-of-bounds reads (CVE-2011-4353).
It was discovered that Libav incorrectly handled certain malformed VMD files. If a user were tricked into opening a crafted VMD file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4364).
It was discovered that Libav incorrectly handled certain malformed SVQ1 streams. If a user were tricked into opening a crafted SVQ1 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4579).
Multiple input validations in the decoders/ demuxers for Westwood Studios VQA, Apple MJPEG-B, Theora, Matroska, Vorbis, Sony ATRAC3, DV, NSV, files could lead to the execution of arbitrary code (CVE-2011-3929, CVE-2011-3936, CVE-2011-3937, CVE-2011-3940, CVE-2011-3945, CVE-2011-3947, CVE-2012-0853, CVE-2012-0858).
The updated packages have been upgraded to the 0.7.12 version where these issues has been corrected.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2012:076.
# The text itself is copyright (C) Mandriva S.A.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(61951);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2011-3362", "CVE-2011-3504", "CVE-2011-3892", "CVE-2011-3893", "CVE-2011-3895", "CVE-2011-3929", "CVE-2011-3936", "CVE-2011-3937", "CVE-2011-3940", "CVE-2011-3945", "CVE-2011-3947", "CVE-2011-3973", "CVE-2011-3974", "CVE-2011-4351", "CVE-2011-4352", "CVE-2011-4353", "CVE-2011-4364", "CVE-2011-4579", "CVE-2012-0853", "CVE-2012-0858");
script_bugtraq_id(49115, 49118, 50555, 50642, 50760, 50880, 51290, 51720);
script_xref(name:"MDVSA", value:"2012:076");
script_name(english:"Mandriva Linux Security Advisory : ffmpeg (MDVSA-2012:076)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandriva Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Multiple vulnerabilities has been found and corrected in ffmpeg :
The Matroska format decoder in FFmpeg does not properly allocate
memory, which allows remote attackers to execute arbitrary code via a
crafted file (CVE-2011-3362, CVE-2011-3504).
cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a
denial of service (incorrect write operation and application crash)
via an invalid bitstream in a Chinese AVS video (aka CAVS) file,
related to the decode_residual_block, check_for_slice, and
cavs_decode_frame functions, a different vulnerability than
CVE-2011-3362 (CVE-2011-3973).
Integer signedness error in the decode_residual_inter function in
cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a
denial of service (incorrect write operation and application crash)
via an invalid bitstream in a Chinese AVS video (aka CAVS) file, a
different vulnerability than CVE-2011-3362 (CVE-2011-3974).
Double free vulnerability in the Theora decoder in FFmpeg allows
remote attackers to cause a denial of service or possibly have
unspecified other impact via a crafted stream (CVE-2011-3892).
FFmpeg does not properly implement the MKV and Vorbis media handlers,
which allows remote attackers to cause a denial of service
(out-of-bounds read) via unspecified vectors (CVE-2011-3893).
Heap-based buffer overflow in the Vorbis decoder in FFmpeg allows
remote attackers to cause a denial of service or possibly have
unspecified other impact via a crafted stream (CVE-2011-3895).
An error within the QDM2 decoder (libavcodec/qdm2.c) can be exploited
to cause a buffer overflow (CVE-2011-4351).
An integer overflow error within the 'vp3_dequant()' function
(libavcodec/vp3.c) can be exploited to cause a buffer overflow
(CVE-2011-4352).
Errors within the 'av_image_fill_pointers()', the 'vp5_parse_coeff()',
and the 'vp6_parse_coeff()' functions can be exploited to trigger
out-of-bounds reads (CVE-2011-4353).
It was discovered that Libav incorrectly handled certain malformed VMD
files. If a user were tricked into opening a crafted VMD file, an
attacker could cause a denial of service via application crash, or
possibly execute arbitrary code with the privileges of the user
invoking the program (CVE-2011-4364).
It was discovered that Libav incorrectly handled certain malformed
SVQ1 streams. If a user were tricked into opening a crafted SVQ1
stream file, an attacker could cause a denial of service via
application crash, or possibly execute arbitrary code with the
privileges of the user invoking the program (CVE-2011-4579).
Multiple input validations in the decoders/ demuxers for Westwood
Studios VQA, Apple MJPEG-B, Theora, Matroska, Vorbis, Sony ATRAC3, DV,
NSV, files could lead to the execution of arbitrary code
(CVE-2011-3929, CVE-2011-3936, CVE-2011-3937, CVE-2011-3940,
CVE-2011-3945, CVE-2011-3947, CVE-2012-0853, CVE-2012-0858).
The updated packages have been upgraded to the 0.7.12 version where
these issues has been corrected."
);
script_set_attribute(
attribute:"see_also",
value:"http://ffmpeg.org/security.html"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ffmpeg");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avfilter1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avformats52");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avutil50");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64ffmpeg-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64ffmpeg-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64ffmpeg52");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64postproc51");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64swscaler0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavfilter1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavformats52");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavutil50");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libffmpeg-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libffmpeg-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libffmpeg52");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libpostproc51");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libswscaler0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2011");
script_set_attribute(attribute:"patch_publication_date", value:"2012/05/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/06");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK2011", reference:"ffmpeg-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64avfilter1-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64avformats52-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64avutil50-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64ffmpeg-devel-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64ffmpeg-static-devel-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64ffmpeg52-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64postproc51-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64swscaler0-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libavfilter1-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libavformats52-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libavutil50-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libffmpeg-devel-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libffmpeg-static-devel-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libffmpeg52-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libpostproc51-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libswscaler0-0.7.12-0.1-mdv2011.0", yank:"mdv")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
mandriva | linux | ffmpeg | p-cpe:/a:mandriva:linux:ffmpeg |
mandriva | linux | lib64avfilter1 | p-cpe:/a:mandriva:linux:lib64avfilter1 |
mandriva | linux | lib64avformats52 | p-cpe:/a:mandriva:linux:lib64avformats52 |
mandriva | linux | lib64avutil50 | p-cpe:/a:mandriva:linux:lib64avutil50 |
mandriva | linux | lib64ffmpeg-devel | p-cpe:/a:mandriva:linux:lib64ffmpeg-devel |
mandriva | linux | lib64ffmpeg-static-devel | p-cpe:/a:mandriva:linux:lib64ffmpeg-static-devel |
mandriva | linux | lib64ffmpeg52 | p-cpe:/a:mandriva:linux:lib64ffmpeg52 |
mandriva | linux | lib64postproc51 | p-cpe:/a:mandriva:linux:lib64postproc51 |
mandriva | linux | lib64swscaler0 | p-cpe:/a:mandriva:linux:lib64swscaler0 |
mandriva | linux | libavfilter1 | p-cpe:/a:mandriva:linux:libavfilter1 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3362
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3892
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4351
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4353
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4364
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4579
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0858
ffmpeg.org/security.html