First published: Fri Feb 12 2016(Updated: )
Integer overflow in the asf_write_packet function in libavformat/asfenc.c in FFmpeg before 2.8.5 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PTS (aka presentation timestamp) value in a .mov file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
FFmpeg | <=2.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2326 is categorized as a high-severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-2326, upgrade FFmpeg to version 2.8.5 or later and ensure your Debian or Ubuntu systems are updated with security patches.
CVE-2016-2326 affects FFmpeg versions up to and including 2.8.4, Debian 7.0, Debian 8.0, and Ubuntu 12.04.
The vulnerability in CVE-2016-2326 is an integer overflow in the asf_write_packet function that can be exploited via crafted .mov files.
By exploiting CVE-2016-2326, attackers may cause a denial of service or potentially achieve other unspecified impacts.