First published: Thu Sep 07 2017(Updated: )
In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 'table_entries_used' would consume huge CPU resources, since there is no EOF check inside the loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14171 is classified as a denial-of-service vulnerability due to high CPU consumption.
To fix CVE-2017-14171, upgrade to a fixed version of FFmpeg that addresses this vulnerability.
CVE-2017-14171 affects FFmpeg versions 2.4 and 3.3.3.
CVE-2017-14171 exploits a DoS condition due to insufficient EOF checks in the NSV file parsing function.
The potential consequences of CVE-2017-14171 include excessive CPU usage that can lead to a system slowdown or crash.