Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing.
References
Link | Resource |
---|---|
https://git.libav.org/?p=libav.git;a=commit;h=0ac8ff618c5e6d878c547a8877e714ed728950ce | Patch |
https://bugzilla.libav.org/show_bug.cgi?id=825 | Exploit Issue Tracking Patch Third Party Advisory VDB Entry |
https://blogs.gentoo.org/ago/2016/08/07/libav-heap-based-buffer-overflow-in-ff_audio_resample-resample-c/ | Exploit Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/18/1 | Exploit Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/13/1 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2017-02-15 11:59
Updated : 2017-02-17 09:34
NVD link : CVE-2016-6832
Mitre link : CVE-2016-6832
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
libav
- libav