First published: Wed Sep 27 2017(Updated: )
The sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c in FFmpeg before 3.3.4 mishandles empty sprop-parameter-sets values, which allows remote attackers to cause a denial of service (heap buffer overflow) or possibly have unspecified other impact via a crafted sdp file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | <=3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14767 is classified as a denial of service vulnerability that may lead to a heap buffer overflow.
To mitigate CVE-2017-14767, upgrade FFmpeg to version 3.3.4 or later.
CVE-2017-14767 affects FFmpeg versions prior to 3.3.4.
If vulnerable, attackers could exploit this vulnerability to trigger a denial of service or potentially other unspecified impacts.
CVE-2017-14767 occurs in the sdp_parse_fmtp_config_h264 function within the libavformat/rtpdec_h264.c file.