First published: Mon Jul 23 2018(Updated: )
FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.1.9-0+deb10u1 7:4.1.11-0+deb10u1 7:4.3.6-0+deb11u1 7:5.1.4-0+deb12u1 7:6.1-5 7:6.1.1-1 | |
FFmpeg | <=4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999011 is classified as a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2018-1999011, update FFmpeg to version 4.1.9-0+deb10u1 or later, depending on your Debian version.
CVE-2018-1999011 is a Buffer Overflow vulnerability specifically found in the ASF format demuxer of FFmpeg.
Exploitation of CVE-2018-1999011 may lead to heap-buffer-overflow, allowing an attacker to execute arbitrary code remotely.
CVE-2018-1999011 affects multiple FFmpeg versions prior to commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869.