Vulnerability Name: CVE-2011-0480 (CCN-64671) Assigned: 2011-01-12 Published: 2011-01-12 Updated: 2020-07-24 Summary: Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-120 Vulnerability Consequences: Gain Access References: Source: MLIST Type: Broken Link[ffmpeg-devel] 20101229 [PATCH] Fix a couple of errors with bad Vorbis headers Source: CONFIRM Type: Issue Tracking, Third Party Advisoryhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610550 Source: CONFIRM Type: Exploit, Issue Tracking, Patch, Vendor Advisoryhttp://code.google.com/p/chromium/issues/detail?id=68115 Source: CONFIRM Type: Patch, Vendor Advisoryhttp://codereview.chromium.org/5964011 Source: CONFIRM Type: Vendor Advisoryhttp://codereview.chromium.org/6069005 Source: MITRE Type: CNACVE-2010-4704 Source: MITRE Type: CNACVE-2010-4705 Source: MITRE Type: CNACVE-2011-0480 Source: CONFIRM Type: Third Party Advisoryhttp://ffmpeg.mplayerhq.hu/ Source: CONFIRM Type: Broken Linkhttp://git.ffmpeg.org/?p=ffmpeg.git;a=commit;h=13184036a6b1b1d4b61c91118c0896e9ad4634c3 Source: CCN Type: Google Chrome Releases Web siteChrome Stable Release Source: CONFIRM Type: Vendor Advisoryhttp://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html Source: OSVDB Type: Broken Link70463 Source: CONFIRM Type: Broken Linkhttp://roundup.ffmpeg.org/issue2548 Source: CONFIRM Type: Broken Linkhttp://roundup.ffmpeg.org/issue2550 Source: CCN Type: SA42850Google Chrome Multiple Vulnerabilities Source: CCN Type: SA42951SRWare Iron Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory42951 Source: CCN Type: SA43197FFmpeg Vorbis Decoder Multiple Vulnerabilities Source: CONFIRM Type: Broken Linkhttp://src.chromium.org/viewvc/chrome?view=rev&revision=70200 Source: DEBIAN Type: Third Party AdvisoryDSA-2306 Source: DEBIAN Type: DSA-2165ffmpeg-debian -- buffer overflow Source: DEBIAN Type: DSA-2306ffmpeg -- several vulnerabilities Source: MANDRIVA Type: Third Party AdvisoryMDVSA-2011:061 Source: CCN Type: OSVDB ID: 70463FFmpeg Vorbis Decoder vorbis_dec.c WebM File Handling Multiple Overflow DoS Source: CCN Type: OSVDB ID: 70650FFmpeg Vorbis Decoder libavcodec/vorbis_dec.c vorbis_floor0_decode Function OGG File Handling Remote DoS Source: CCN Type: OSVDB ID: 70651FFmpeg Vorbis Decoder libavcodec/vorbis_dec.c vorbis_residue_decode_internal Function Overflow Source: BID Type: Third Party Advisory, VDB Entry45788 Source: CCN Type: BID-45788Google Chrome prior to 8.0.552.237 Multiple Security Vulnerabilities Source: CCN Type: BID-46294FFmpeg Integer Overflow and Denial of Service Vulnerabilities Source: CCN Type: BID-47154FFmpeg Vorbis Decoder 'vorbis_dec.c' Multiple Buffer Overflow Vulnerabilities Source: CONFIRM Type: Third Party Advisoryhttp://www.srware.net/forum/viewtopic.php?f=18&t=2054 Source: UBUNTU Type: Third Party AdvisoryUSN-1104-1 Source: XF Type: Third Party Advisory, VDB Entrychrome-vorbis-bo(64671) Source: XF Type: UNKNOWNchrome-vorbis-bo(64671) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:14380 Vulnerable Configuration: Configuration 1 :cpe:/o:google:chrome_os:*:*:*:*:*:*:*:* (Version < 8.0.552.344)Configuration 2 :cpe:/a:google:chrome:*:*:*:*:*:*:*:* (Version < 8.0.552.237)Configuration 3 :cpe:/o:debian:debian_linux:6.0:*:*:*:*:*:*:* Configuration 4 :cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* OR cpe:/o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* OR cpe:/o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_7:-:-:*:*:ultimate_n:*:x64:* OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:* OR cpe:/a:google:chrome:8.0.549.0:*:*:*:*:*:*:* OR cpe:/a:google:chrome:8.0.550.0:*:*:*:*:*:*:* OR cpe:/a:google:chrome:8.0.551.0:*:*:*:*:*:*:* OR cpe:/a:google:chrome:8.0.552.0:*:*:*:*:*:*:* AND cpe:/a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:* OR cpe:/a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:* OR cpe:/a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:* OR cpe:/a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:* OR cpe:/a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:13661 P USN-1104-1 -- ffmpeg vulnerabilities 2014-06-30 oval:org.mitre.oval:def:15128 P DSA-2306-1 ffmpeg -- several 2014-06-23 oval:org.mitre.oval:def:14380 V Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue. 2014-04-07
BACK
google chrome os *
google chrome *
debian debian linux 6.0
canonical ubuntu linux 8.04
canonical ubuntu linux 9.10
canonical ubuntu linux 10.04
canonical ubuntu linux 10.10
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows xp sp2
microsoft windows vista - sp1
microsoft windows vista - sp1
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows xp sp3
microsoft windows vista - sp2
microsoft windows vista - sp2
microsoft windows server 2008 sp2
microsoft windows server 2008 sp2
microsoft windows 7 -
microsoft windows 7 -
microsoft windows server 2008 - r2
microsoft windows server 2008 r2
microsoft windows server 2008
google chrome 8.0.549.0
google chrome 8.0.550.0
google chrome 8.0.551.0
google chrome 8.0.552.0
ffmpeg ffmpeg 0.4.8
ffmpeg ffmpeg 0.4.7
ffmpeg ffmpeg 0.4.6
ffmpeg ffmpeg 0.4.9
ffmpeg ffmpeg 0.8.7