First published: Sat Sep 09 2017(Updated: )
In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =3.3.3 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14223 is classified as a denial of service vulnerability due to potential CPU exhaustion.
To fix CVE-2017-14223, upgrade to FFmpeg version 3.3.4 or later to ensure proper EOF checks.
CVE-2017-14223 affects FFmpeg version 3.3.3 and also impacts Debian GNU/Linux versions 8.0 and 9.0.
CVE-2017-14223 is caused by a lack of End of File checks in the asf_build_simple_index() function when handling crafted ASF files.
Yes, CVE-2017-14223 can be exploited remotely if a user opens a malicious ASF file.