First published: Wed Feb 15 2017(Updated: )
Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libavutil | <=11.4 | |
<=11.4 |
https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7393 has a high severity level due to its potential to cause denial of service.
To fix CVE-2016-7393, update Libav to version 11.5 or later.
The vulnerability in CVE-2016-7393 is caused by a stack-based buffer overflow in the aac_sync function.
CVE-2016-7393 affects versions of Libav prior to 11.5.
An attacker can exploit CVE-2016-7393 to perform remote denial of service attacks through crafted files.