First published: Mon Sep 20 2010(Updated: )
oCERT reported a vulnerability that affects the flic video codec support in ffmpeg. Quoting: "The MPlayer package [1] is vulnerable to an arbitrary offset dereference vulnerability, which could be exploited by malicious remote attacker. The vulnerability is caused by the MPlayer's flic codec (flicvideo.c) on 8 bits per pixel videos because the codec does not check received values. This could be exploited jumping to arbitrary code by opening a specially crafted file." They were particularly concerned about the ffmpeg inclusion in mplayer. The affected file (flicvideo.c) is also present in libextractor as provided by Fedora 12. It looks as though the only thing using libextractor in Fedora is doodle (local search program, like Spotlight). This would mean a user would have to download a specially crafted file and store it locally, and be using doodle to index files. I don't know whether or not doodle would be problematic here, i.e. if it's just reading metadata it might not cause any problems at all. Later versions of libextractor have removed the embedded ffmpeg sources.
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | ||
DVD Player | ||
libextractor | >=12 | |
Doodle |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in REDHAT-BUG-635775 is considered critical as it allows for arbitrary offset dereference, potentially leading to exploitation by remote attackers.
To fix REDHAT-BUG-635775, users should update the affected versions of FFmpeg, MPlayer, and libextractor to the latest patched versions.
The products affected by REDHAT-BUG-635775 include FFmpeg, MPlayer, and libextractor versions from 12 onwards.
Yes, REDHAT-BUG-635775 can be exploited by a malicious remote attacker using the vulnerable flic video codec support.
The vulnerability in REDHAT-BUG-635775 affects the flic video codec support in the MPlayer package.