First published: Thu Aug 31 2017(Updated: )
In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large "frame_count" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14056 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2017-14056, update FFmpeg to a version later than 3.3.3 where this vulnerability has been resolved.
CVE-2017-14056 specifically affects FFmpeg version 3.3.3.
CVE-2017-14056 can be exploited to cause excessive CPU and memory usage, leading to a denial of service.
The vulnerability in CVE-2017-14056 stems from a lack of an EOF check in the rl2_read_header function.