First published: Wed Jun 28 2017(Updated: )
Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | <2.8.12 | |
FFmpeg | >=3.0<3.0.8 | |
FFmpeg | >=3.1<3.1.8 | |
FFmpeg | >=3.2<3.2.5 | |
FFmpeg | >=3.3<3.3.1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9992 has been classified as a moderate severity vulnerability due to its ability to cause denial of service.
To fix CVE-2017-9992, update FFmpeg to versions 2.8.12, 3.0.8, 3.1.8, 3.2.5, or 3.3.1 or later.
CVE-2017-9992 affects FFmpeg versions prior to 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1.
Yes, CVE-2017-9992 can be exploited remotely to cause an application crash through a heap-based buffer overflow.
The potential impacts of CVE-2017-9992 include application crashes and possible unspecified other impacts due to buffer overflow.