Vulnerability Name:

CVE-2011-0480 (CCN-64671)

Assigned:2011-01-12
Published:2011-01-12
Updated:2020-07-24
Summary:Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: MLIST
Type: Broken Link
[ffmpeg-devel] 20101229 [PATCH] Fix a couple of errors with bad Vorbis headers

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610550

Source: CONFIRM
Type: Exploit, Issue Tracking, Patch, Vendor Advisory
http://code.google.com/p/chromium/issues/detail?id=68115

Source: CONFIRM
Type: Patch, Vendor Advisory
http://codereview.chromium.org/5964011

Source: CONFIRM
Type: Vendor Advisory
http://codereview.chromium.org/6069005

Source: MITRE
Type: CNA
CVE-2010-4704

Source: MITRE
Type: CNA
CVE-2010-4705

Source: MITRE
Type: CNA
CVE-2011-0480

Source: CONFIRM
Type: Third Party Advisory
http://ffmpeg.mplayerhq.hu/

Source: CONFIRM
Type: Broken Link
http://git.ffmpeg.org/?p=ffmpeg.git;a=commit;h=13184036a6b1b1d4b61c91118c0896e9ad4634c3

Source: CCN
Type: Google Chrome Releases Web site
Chrome Stable Release

Source: CONFIRM
Type: Vendor Advisory
http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html

Source: OSVDB
Type: Broken Link
70463

Source: CONFIRM
Type: Broken Link
http://roundup.ffmpeg.org/issue2548

Source: CONFIRM
Type: Broken Link
http://roundup.ffmpeg.org/issue2550

Source: CCN
Type: SA42850
Google Chrome Multiple Vulnerabilities

Source: CCN
Type: SA42951
SRWare Iron Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
42951

Source: CCN
Type: SA43197
FFmpeg Vorbis Decoder Multiple Vulnerabilities

Source: CONFIRM
Type: Broken Link
http://src.chromium.org/viewvc/chrome?view=rev&revision=70200

Source: DEBIAN
Type: Third Party Advisory
DSA-2306

Source: DEBIAN
Type: DSA-2165
ffmpeg-debian -- buffer overflow

Source: DEBIAN
Type: DSA-2306
ffmpeg -- several vulnerabilities

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2011:061

Source: CCN
Type: OSVDB ID: 70463
FFmpeg Vorbis Decoder vorbis_dec.c WebM File Handling Multiple Overflow DoS

Source: CCN
Type: OSVDB ID: 70650
FFmpeg Vorbis Decoder libavcodec/vorbis_dec.c vorbis_floor0_decode Function OGG File Handling Remote DoS

Source: CCN
Type: OSVDB ID: 70651
FFmpeg Vorbis Decoder libavcodec/vorbis_dec.c vorbis_residue_decode_internal Function Overflow

Source: BID
Type: Third Party Advisory, VDB Entry
45788

Source: CCN
Type: BID-45788
Google Chrome prior to 8.0.552.237 Multiple Security Vulnerabilities

Source: CCN
Type: BID-46294
FFmpeg Integer Overflow and Denial of Service Vulnerabilities

Source: CCN
Type: BID-47154
FFmpeg Vorbis Decoder 'vorbis_dec.c' Multiple Buffer Overflow Vulnerabilities

Source: CONFIRM
Type: Third Party Advisory
http://www.srware.net/forum/viewtopic.php?f=18&t=2054

Source: UBUNTU
Type: Third Party Advisory
USN-1104-1

Source: XF
Type: Third Party Advisory, VDB Entry
chrome-vorbis-bo(64671)

Source: XF
Type: UNKNOWN
chrome-vorbis-bo(64671)

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:14380

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:chrome_os:*:*:*:*:*:*:*:* (Version < 8.0.552.344)

  • Configuration 2:
  • cpe:/a:google:chrome:*:*:*:*:*:*:*:* (Version < 8.0.552.237)

  • Configuration 3:
  • cpe:/o:debian:debian_linux:6.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:-:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*
  • OR cpe:/a:google:chrome:8.0.549.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:8.0.550.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:8.0.551.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:8.0.552.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:13661
    P
    USN-1104-1 -- ffmpeg vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:15128
    P
    DSA-2306-1 ffmpeg -- several
    2014-06-23
    oval:org.mitre.oval:def:14380
    V
    Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue.
    2014-04-07
    BACK
    google chrome os *
    google chrome *
    debian debian linux 6.0
    canonical ubuntu linux 8.04
    canonical ubuntu linux 9.10
    canonical ubuntu linux 10.04
    canonical ubuntu linux 10.10
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows xp sp2
    microsoft windows vista - sp1
    microsoft windows vista - sp1
    microsoft windows server 2008 -
    microsoft windows server 2008 -
    microsoft windows server 2008 -
    microsoft windows xp sp3
    microsoft windows vista - sp2
    microsoft windows vista - sp2
    microsoft windows server 2008 sp2
    microsoft windows server 2008 sp2
    microsoft windows 7 -
    microsoft windows 7 -
    microsoft windows server 2008 - r2
    microsoft windows server 2008 r2
    microsoft windows server 2008
    google chrome 8.0.549.0
    google chrome 8.0.550.0
    google chrome 8.0.551.0
    google chrome 8.0.552.0
    ffmpeg ffmpeg 0.4.8
    ffmpeg ffmpeg 0.4.7
    ffmpeg ffmpeg 0.4.6
    ffmpeg ffmpeg 0.4.9
    ffmpeg ffmpeg 0.8.7