First published: Thu Nov 30 2017(Updated: )
The gmc_mmx function in libavcodec/x86/mpegvideodsp.c in FFmpeg 2.3 and 3.4 does not properly validate widths and heights, which allows remote attackers to cause a denial of service (integer signedness error and out-of-array read) via a crafted MPEG file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.1.9-0+deb10u1 7:4.1.11-0+deb10u1 7:4.3.6-0+deb11u1 7:5.1.3-1 7:6.0-7 | |
FFmpeg | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17081 has a severity rating that indicates it can lead to denial of service due to improper validation in the gmc_mmx function.
To fix CVE-2017-17081, update FFmpeg to a version that includes the security patch, such as version 3.4 or later.
CVE-2017-17081 affects FFmpeg versions 2.3 and 3.4, including specific Debian package versions.
CVE-2017-17081 can be exploited by remote attackers through specially crafted MPEG files.
The consequences of CVE-2017-17081 include potential denial of service and application crashes due to an integer signedness error.