First published: Wed Feb 10 2010(Updated: )
Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that (1) bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or (2) access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4634 is classified as a high severity vulnerability due to potential denial of service and arbitrary code execution.
To fix CVE-2009-4634, upgrade to a patched version of FFmpeg that addresses the integer underflow issues.
FFmpeg version 0.5 is known to be affected by CVE-2009-4634.
CVE-2009-4634 can be exploited to cause denial of service or potentially allow attackers to execute arbitrary code.
Exploitation of CVE-2009-4634 typically involves crafted multimedia files that bypass validation checks in FFmpeg.