Vulnerability Name: | CVE-2011-4031 (CCN-70012) | ||||||||||||
Assigned: | 2011-09-07 | ||||||||||||
Published: | 2011-09-07 | ||||||||||||
Updated: | 2020-12-16 | ||||||||||||
Summary: | Integer underflow in the asfrtp_parse_packet function in libavformat/rtpdec_asf.c in FFmpeg before 0.8.3 allows remote attackers to execute arbitrary code via a crafted ASF packet. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-191 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-4031 Source: CCN Type: FFmpeg Web Site FFmpeg Source: CCN Type: FFmpeg Web ffmpeg-0.7.4.changelog Source: CONFIRM Type: Patch, Third Party Advisory http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c2a2ad133eb9d42361804a568dee336992349a5e Source: CONFIRM Type: Third Party Advisory http://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=n0.8.3 Source: CCN Type: SA46111 FFmpeg Multiple Vulnerabilities Source: MISC Type: Patch, Third Party Advisory http://technet.microsoft.com/en-us/security/msvr/msvr11-012 Source: CCN Type: OSVDB ID: 75658 FFmpeg libavformat/rtpdec_asf.c asfrtp_parse_packet() Function ASF Packet Parsing Memory Corruption Source: XF Type: UNKNOWN ffmpeg-libavformat-asf-ce(70012) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |