First published: Thu Aug 31 2017(Updated: )
In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14059 is classified as a DoS vulnerability due to the potential for significant CPU and memory consumption.
To mitigate CVE-2017-14059, upgrade to a patched version of FFmpeg that addresses the vulnerability.
CVE-2017-14059 specifically affects FFmpeg version 3.3.3.
CVE-2017-14059 is related to denial-of-service attacks that exploit the parsing of crafted CINE files.
The impact of CVE-2017-14059 can lead to excessive CPU and memory usage, potentially causing system slowdowns or crashes.