First published: Thu Feb 09 2017(Updated: )
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | <=2.8.9 | |
FFmpeg | =3.0 | |
FFmpeg | =3.0.1 | |
FFmpeg | =3.0.2 | |
FFmpeg | =3.0.3 | |
FFmpeg | =3.0.4 | |
FFmpeg | =3.1 | |
FFmpeg | =3.1.1 | |
FFmpeg | =3.1.2 | |
FFmpeg | =3.1.3 | |
FFmpeg | =3.1.4 | |
FFmpeg | =3.1.5 | |
FFmpeg | =3.2 | |
FFmpeg | =3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10192 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2016-10192, upgrade FFmpeg to a version later than 2.8.10, 3.0.5, 3.1.6, or 3.2.2.
CVE-2016-10192 affects FFmpeg versions prior to 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2.
CVE-2016-10192 can be exploited via crafted media files that leverage the failure to check chunk sizes.
Yes, CVE-2016-10192 can be exploited remotely, allowing attackers to execute arbitrary code.