First published: Sat Feb 23 2013(Updated: )
Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg through 1.1.3, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds array access) or possibly have unspecified other impact via vectors involving a zero value for a bark map size.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <25.0.1364.99 | |
Apple iOS and macOS | ||
Google Chrome | <25.0.1364.97 | |
Linux Kernel | ||
Microsoft Windows | ||
FFmpeg | <=1.1.3 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0894 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2013-0894, upgrade to FFmpeg version 1.1.4 or later and ensure you are using the latest version of Google Chrome.
CVE-2013-0894 affects FFmpeg versions up to 1.1.3 and Google Chrome versions prior to 25.0.1364.97 on Windows and Linux and 25.0.1364.99 on Mac OS X.
CVE-2013-0894 can be exploited by remote attackers to cause denial of service or potentially execute arbitrary code via specially crafted media files.
Yes, patches for CVE-2013-0894 are available in the latest updates of FFmpeg and Google Chrome.