FFmpeg 4xm Processing Memory Corruption
Publish Date: 14 février 2011
Identifiant(s) CVE: : CVE-2009-0385
Date du conseil: 14 février 2011
Description
Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1003298
Trend Micro Deep Security DPI Rule Name: 1003298 - FFmpeg 4xm Processing Memory Corruption
Affected software and version:
- FFmpeg