First published: Thu Feb 09 2017(Updated: )
Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | <=2.8.9 | |
FFmpeg | =3.0 | |
FFmpeg | =3.0.1 | |
FFmpeg | =3.0.2 | |
FFmpeg | =3.0.3 | |
FFmpeg | =3.0.4 | |
FFmpeg | =3.1 | |
FFmpeg | =3.1.1 | |
FFmpeg | =3.1.2 | |
FFmpeg | =3.1.3 | |
FFmpeg | =3.1.4 | |
FFmpeg | =3.1.5 | |
FFmpeg | =3.2 | |
FFmpeg | =3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10190 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-10190, update FFmpeg to version 2.8.10, 3.0.5, 3.1.6, or 3.2.2 or later.
CVE-2016-10190 affects FFmpeg versions prior to 2.8.10 and 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2.
Any system using the vulnerable versions of FFmpeg for media processing or streaming is at risk from CVE-2016-10190.
Yes, CVE-2016-10190 can be exploited remotely through specially crafted HTTP responses containing a negative chunk size.