Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/06/26/22 | Mailing List Third Party Advisory |
http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html | Exploit Third Party Advisory |
https://libav.org/news/#2014-06-27 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-01-14 08:15
Updated : 2020-01-21 08:49
NVD link : CVE-2014-4609
Mitre link : CVE-2014-4609
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
libav
- libav