Vulnerabilities > CVE-2013-7010 - Numeric Errors vulnerability in Ffmpeg
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple integer signedness errors in libavcodec/dsputil.c in FFmpeg before 2.1 allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted data.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201603-06.NASL description The remote host is affected by the vulnerability described in GLSA-201603-06 (FFmpeg: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 89899 published 2016-03-14 reporter This script is Copyright (C) 2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/89899 title GLSA-201603-06 : FFmpeg: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201603-06. # # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(89899); script_version("$Revision: 2.1 $"); script_cvs_date("$Date: 2016/03/14 14:55:46 $"); script_cve_id("CVE-2013-0860", "CVE-2013-0861", "CVE-2013-0862", "CVE-2013-0863", "CVE-2013-0864", "CVE-2013-0865", "CVE-2013-0866", "CVE-2013-0867", "CVE-2013-0868", "CVE-2013-0872", "CVE-2013-0873", "CVE-2013-0874", "CVE-2013-0875", "CVE-2013-0876", "CVE-2013-0877", "CVE-2013-0878", "CVE-2013-4263", "CVE-2013-4264", "CVE-2013-4265", "CVE-2013-7008", "CVE-2013-7009", "CVE-2013-7010", "CVE-2013-7011", "CVE-2013-7012", "CVE-2013-7013", "CVE-2013-7014", "CVE-2013-7015", "CVE-2013-7016", "CVE-2013-7017", "CVE-2013-7018", "CVE-2013-7019", "CVE-2013-7020", "CVE-2013-7021", "CVE-2013-7022", "CVE-2013-7023", "CVE-2013-7024", "CVE-2014-2097", "CVE-2014-2098", "CVE-2014-2263", "CVE-2014-5271", "CVE-2014-5272", "CVE-2014-7937", "CVE-2014-8541", "CVE-2014-8542", "CVE-2014-8543", "CVE-2014-8544", "CVE-2014-8545", "CVE-2014-8546", "CVE-2014-8547", "CVE-2014-8548", "CVE-2014-8549", "CVE-2014-9316", "CVE-2014-9317", "CVE-2014-9318", "CVE-2014-9319", "CVE-2014-9602", "CVE-2014-9603", "CVE-2014-9604", "CVE-2015-3395"); script_xref(name:"GLSA", value:"201603-06"); script_name(english:"GLSA-201603-06 : FFmpeg: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201603-06 (FFmpeg: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201603-06" ); script_set_attribute( attribute:"solution", value: "All FFmpeg users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=media-video/ffmpeg-2.6.3'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:ffmpeg"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2016/03/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/03/14"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2016 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"media-video/ffmpeg", unaffected:make_list("ge 2.6.3"), vulnerable:make_list("lt 2.6.3"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "FFmpeg"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-2855.NASL description Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. The IDs mentioned above are just a portion of the security issues fixed in this update. A full list of the changes is available at http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8 .10 last seen 2020-03-17 modified 2014-02-06 plugin id 72355 published 2014-02-06 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72355 title Debian DSA-2855-1 : libav - several vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-2855. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(72355); script_version("1.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12"); script_cve_id("CVE-2011-3944", "CVE-2013-0845", "CVE-2013-0846", "CVE-2013-0849", "CVE-2013-0865", "CVE-2013-7010", "CVE-2013-7014", "CVE-2013-7015"); script_bugtraq_id(51720, 57868, 63796, 63936); script_xref(name:"DSA", value:"2855"); script_name(english:"Debian DSA-2855-1 : libav - several vulnerabilities"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. The IDs mentioned above are just a portion of the security issues fixed in this update. A full list of the changes is available at http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8 .10" ); # http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.10 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?df9bf7ae" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/wheezy/libav" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2014/dsa-2855" ); script_set_attribute( attribute:"solution", value: "Upgrade the libav packages. For the stable distribution (wheezy), these problems have been fixed in version 6:0.8.10-1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libav"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0"); script_set_attribute(attribute:"patch_publication_date", value:"2014/02/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"7.0", prefix:"ffmpeg", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"ffmpeg-dbg", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"ffmpeg-doc", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libav-dbg", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libav-doc", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libav-extra-dbg", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libav-tools", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavcodec-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavcodec-extra-53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavcodec53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavdevice-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavdevice-extra-53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavdevice53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavfilter-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavfilter-extra-2", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavfilter2", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavformat-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavformat-extra-53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavformat53", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavutil-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavutil-extra-51", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libavutil51", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libpostproc-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libpostproc-extra-52", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libpostproc52", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libswscale-dev", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libswscale-extra-2", reference:"6:0.8.10-1")) flag++; if (deb_check(release:"7.0", prefix:"libswscale2", reference:"6:0.8.10-1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
References
- http://ffmpeg.org/security.html
- http://openwall.com/lists/oss-security/2013/12/08/3
- http://openwall.com/lists/oss-security/2013/11/26/7
- https://github.com/FFmpeg/FFmpeg/commit/454a11a1c9c686c78aa97954306fb63453299760
- http://www.debian.org/security/2014/dsa-2855
- https://security.gentoo.org/glsa/201603-06
- http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v9.11