Ubuntu 1209-1: FFmpeg vulnerabilities

    Date19 Sep 2011
    CategoryUbuntu
    40
    Posted ByLinuxSecurity Advisories
    FFmpeg could be made to run programs as your login if it opened a specially crafted file.
    ==========================================================================
    Ubuntu Security Notice USN-1209-1
    September 19, 2011
    
    ffmpeg vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    FFmpeg could be made to run programs as your login if it opened a specially
    crafted file.
    
    Software Description:
    - ffmpeg: multimedia player, server and encoder
    
    Details:
    
    It was discovered that FFmpeg incorrectly handled certain malformed ogg
    files. If a user were tricked into opening a crafted ogg file, an attacker
    could cause a denial of service via application crash, or possibly execute
    arbitrary code with the privileges of the user invoking the program. This
    issue only affected Ubuntu 10.10. (CVE-2011-1196)
    
    It was discovered that FFmpeg incorrectly handled certain malformed AMV
    files. If a user were tricked into opening a crafted AMV file, an attacker
    could cause a denial of service via application crash, or possibly execute
    arbitrary code with the privileges of the user invoking the program. This
    issue only affected Ubuntu 10.10. (CVE-2011-1931)
    
    It was discovered that FFmpeg incorrectly handled certain malformed APE
    files. If a user were tricked into opening a crafted APE file, an attacker
    could cause a denial of service via application crash. (CVE-2011-2161)
    
    Emmanouel Kellinis discovered that FFmpeg incorrectly handled certain
    malformed CAVS files. If a user were tricked into opening a crafted CAVS
    file, an attacker could cause a denial of service via application crash, or
    possibly execute arbitrary code with the privileges of the user invoking
    the program. (CVE-2011-3362)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 10.10:
      libavcodec52                    4:0.6-2ubuntu6.2
      libavformat52                   4:0.6-2ubuntu6.2
    
    Ubuntu 10.04 LTS:
      libavcodec52                    4:0.5.1-1ubuntu1.2
      libavformat52                   4:0.5.1-1ubuntu1.2
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1209-1
      CVE-2011-1196, CVE-2011-1931, CVE-2011-2161, CVE-2011-3362
    
    Package Information:
      https://launchpad.net/ubuntu/+source/ffmpeg/4:0.6-2ubuntu6.2
      https://launchpad.net/ubuntu/+source/ffmpeg/4:0.5.1-1ubuntu1.2
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.