First published: Mon Aug 20 2012(Updated: )
The decodeTonalComponents function in the Actrac3 codec (atrac3.c) in libavcodec in FFmpeg 0.7.x before 0.7.12, and 0.8.x before 0.8.11; and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (infinite loop and crash) and possibly execute arbitrary code via a large component count in an Atrac 3 file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =0.7 | |
FFmpeg | =0.7.1 | |
FFmpeg | =0.7.2 | |
FFmpeg | =0.7.3 | |
FFmpeg | =0.7.6 | |
FFmpeg | =0.7.7 | |
FFmpeg | =0.7.8 | |
FFmpeg | =0.7.9 | |
FFmpeg | =0.7.11 | |
FFmpeg | =0.8.0 | |
FFmpeg | =0.8.1 | |
FFmpeg | =0.8.2 | |
FFmpeg | =0.8.5 | |
FFmpeg | =0.8.6 | |
FFmpeg | =0.8.7 | |
FFmpeg | =0.8.8 | |
FFmpeg | =0.8.10 | |
libavutil | =0.5 | |
libavutil | =0.5.1 | |
libavutil | =0.5.2 | |
libavutil | =0.5.3 | |
libavutil | =0.5.4 | |
libavutil | =0.5.5 | |
libavutil | =0.5.6 | |
libavutil | =0.5.7 | |
libavutil | =0.6 | |
libavutil | =0.6.1 | |
libavutil | =0.6.2 | |
libavutil | =0.6.3 | |
libavutil | =0.6.4 | |
libavutil | =0.6.5 | |
libavutil | =0.7 | |
libavutil | =0.7-beta1 | |
libavutil | =0.7-beta2 | |
libavutil | =0.7.1 | |
libavutil | =0.7.2 | |
libavutil | =0.7.3 | |
libavutil | =0.7.4 | |
libavutil | =0.8 | |
libavutil | =0.8-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0853 is classified as a denial of service vulnerability that can result in an infinite loop.
To fix CVE-2012-0853, update your FFmpeg and Libav versions to the specified patched releases, that is FFmpeg 0.7.12 or 0.8.11 and Libav 0.5.9, 0.6.6, 0.7.5, or 0.8.1.
CVE-2012-0853 affects FFmpeg versions 0.7.x before 0.7.12 and 0.8.x before 0.8.11, as well as certain Libav versions.
The vulnerability in CVE-2012-0853 is caused by a flaw in the decodeTonalComponents function within the Actrac3 codec.
Yes, CVE-2012-0853 can be exploited by remote attackers, allowing them to trigger the denial of service condition.