First published: Mon Feb 02 2009(Updated: )
FFmpeg could allow a remote attacker to execute arbitrary code on the system, caused by an integer signedness error in the fourxm_read_header() function in libavformat/4xm.c. By persuading a victim to open a specially-crafted 4X movie file with a large current_track value, a remote attacker could exploit this vulnerability to corrupt memory, trigger a NULL pointer dereference and execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg FFmpeg | <0.6.3 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =6.0 | |
Canonical Ubuntu Linux | =7.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =8.10 | |
Fedoraproject Fedora | =9 | |
Fedoraproject Fedora | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0385 is a vulnerability in FFmpeg that could allow a remote attacker to execute arbitrary code on the system.
CVE-2009-0385 is caused by an integer signedness error in the fourxm_read_header() function in libavformat/4xm.c.
CVE-2009-0385 has a severity rating of 9.3 (Critical).
FFmpeg versions up to 0.6.3, Debian Linux versions 4.0, 5.0, and 6.0, Ubuntu Linux versions 7.10, 8.04, and 8.10, and Fedora versions 9 and 10 are affected by CVE-2009-0385.
To fix CVE-2009-0385, update FFmpeg to a version higher than 0.6.3 or apply the necessary security patches from the respective Linux distribution.