First published: Tue Jan 14 2020(Updated: )
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libavutil | <0.8.13 | |
libavutil | >=9.0<9.14 | |
libavutil | >=10.0<10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4609 has a high severity due to potential arbitrary code execution by remote attackers.
Fix CVE-2014-4609 by updating Libav to version 0.8.13 or later, or to version 9.14 or later, or to version 10.2 or later.
CVE-2014-4609 affects Libav versions prior to 0.8.13, versions 9.0 through 9.13, and versions 10.0 through 10.1.
CVE-2014-4609 is caused by an integer overflow in the get_len function in libavutil/lzo.c.
Yes, CVE-2014-4609 can be exploited by attackers through specially crafted input that triggers the vulnerability.