Vulnerabilities > CVE-2017-14055 - Excessive Iteration vulnerability in Ffmpeg 3.3.3

047910
CVSS 7.1 - HIGH
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
ffmpeg
CWE-834
nessus

Summary

In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop.

Vulnerable Configurations

Part Description Count
Application
Ffmpeg
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-1067.NASL
    descriptionThis update introduces lame and twolame. For ffmpeg2 it updates to version 2.8.13 and fixes several issues. These security issues were fixed : - CVE-2017-14058: The read_data function in libavformat/hls.c did not restrict reload attempts for an insufficient list, which allowed remote attackers to cause a denial of service (infinite loop) (bsc#1056762). - CVE-2017-14057: In asf_read_marker() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted ASF file, which claims a large
    last seen2020-06-05
    modified2017-09-18
    plugin id103289
    published2017-09-18
    reporterThis script is Copyright (C) 2017-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/103289
    titleopenSUSE Security Update : ffmpeg / ffmpeg2 (openSUSE-2017-1067)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2017-1067.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(103289);
      script_version("3.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2016-10190", "CVE-2016-10191", "CVE-2016-10192", "CVE-2016-9561", "CVE-2017-11399", "CVE-2017-14054", "CVE-2017-14055", "CVE-2017-14056", "CVE-2017-14057", "CVE-2017-14058", "CVE-2017-14059", "CVE-2017-14169", "CVE-2017-14170", "CVE-2017-14171", "CVE-2017-14222", "CVE-2017-14223", "CVE-2017-14225", "CVE-2017-7863", "CVE-2017-7865", "CVE-2017-7866");
    
      script_name(english:"openSUSE Security Update : ffmpeg / ffmpeg2 (openSUSE-2017-1067)");
      script_summary(english:"Check for the openSUSE-2017-1067 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update introduces lame and twolame. For ffmpeg2 it updates to
    version 2.8.13 and fixes several issues.
    
    These security issues were fixed :
    
      - CVE-2017-14058: The read_data function in
        libavformat/hls.c did not restrict reload attempts for
        an insufficient list, which allowed remote attackers to
        cause a denial of service (infinite loop) (bsc#1056762).
    
      - CVE-2017-14057: In asf_read_marker() due to lack of an
        EOF (End of File) check might have caused huge CPU and
        memory consumption. When a crafted ASF file, which
        claims a large 'name_len' or 'count' field in the header
        but did not contain sufficient backing data, was
        provided, the loops over the name and markers would
        consume huge CPU and memory resources, since there is no
        EOF check inside these loops (bsc#1056761).
    
      - CVE-2017-14059: A DoS in cine_read_header() due to lack
        of an EOF check might have caused huge CPU and memory
        consumption. When a crafted CINE file, which claims a
        large 'duration' field in the header but did not contain
        sufficient backing data, was provided, the image-offset
        parsing loop would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056763).
    
      - CVE-2017-14056: A DoS in rl2_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted RL2 file, which
        claims a large 'frame_count' field in the header but did
        not contain sufficient backing data, was provided, the
        loops (for offset and size tables) would consume huge
        CPU and memory resources, since there is no EOF check
        inside these loops (bsc#1056760).
    
      - CVE-2017-14055: a DoS in mv_read_header() due to lack of
        an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted MV file, which
        claims a large 'nb_frames' field in the header but did
        not contain sufficient backing data, was provided, the
        loop over the frames would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056766).
    
      - boo#1046211: Lots of integer overflow fixes
    
      - CVE-2016-9561: The che_configure function in
        libavcodec/aacdec_template.c in FFmpeg allowed remote
        attackers to cause a denial of service (allocation of
        huge memory, and being killed by the OS) via a crafted
        MOV file (boo#1015120)
    
      - CVE-2017-7863: FFmpeg had an out-of-bounds write caused
        by a heap-based buffer overflow related to the
        decode_frame_common function in libavcodec/pngdec.c
        (boo#1034179)
    
      - CVE-2017-7865: FFmpeg had an out-of-bounds write caused
        by a heap-based buffer overflow related to the
        ipvideo_decode_block_opcode_0xA function in
        libavcodec/interplayvideo.c and the
        avcodec_align_dimensions2 function in libavcodec/utils.c
        (boo#1034177)
    
      - CVE-2017-7866: FFmpeg had an out-of-bounds write caused
        by a stack-based buffer overflow related to the
        decode_zbuf function in libavcodec/pngdec.c
        (boo#1034176)
    
      - CVE-2016-10190: Heap-based buffer overflow in
        libavformat/http.c in FFmpeg allowed remote web servers
        to execute arbitrary code via a negative chunk size in
        an HTTP response (boo#1022920)
    
      - CVE-2016-10191: Heap-based buffer overflow in
        libavformat/rtmppkt.c in FFmpeg allowed remote attackers
        to execute arbitrary code by leveraging failure to check
        for RTMP packet size mismatches (boo#1022921)
    
      - CVE-2016-10192: Heap-based buffer overflow in ffserver.c
        in FFmpeg allowed remote attackers to execute arbitrary
        code by leveraging failure to check chunk size
        (boo#1022922)
    
      - CVE-2017-14169: In the mxf_read_primer_pack function an
        integer signedness error have might occured when a
        crafted file, which claims a large 'item_num' field such
        as 0xffffffff, was provided. As a result, the variable
        'item_num' turns negative, bypassing the check for a
        large value (bsc#1057536).
    
      - CVE-2017-14170: Prevent DoS in
        mxf_read_index_entry_array() due to lack of an EOF (End
        of File) check that might have caused huge CPU
        consumption. When a crafted MXF file, which claims a
        large 'nb_index_entries' field in the header but did not
        contain sufficient backing data, was provided, the loop
        would consume huge CPU resources, since there was no EOF
        check inside the loop. Moreover, this big loop can be
        invoked multiple times if there is more than one
        applicable data segment in the crafted MXF file
        (bsc#1057537).
    
      - CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header()
        due to lack of an EOF (End of File) check taht might
        have caused huge CPU consumption. When a crafted NSV
        file, which claims a large 'table_entries_used' field in
        the header but did not contain sufficient backing data,
        was provided, the loop over 'table_entries_used' would
        consume huge CPU resources, since there was no EOF check
        inside the loop (bsc#1057539).
    
      - CVE-2017-14223: Prevent DoS in asf_build_simple_index()
        due to lack of an EOF (End of File) check that might
        have caused huge CPU consumption. When a crafted ASF
        file, which claims a large 'ict' field in the header but
        did not contain sufficient backing data, was provided,
        the for loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058019)
    
      - CVE-2017-14222: Prevent DoS in read_tfra() due to lack
        of an EOF (End of File) check that might have caused
        huge CPU and memory consumption. When a crafted MOV
        file, which claims a large 'item_count' field in the
        header but did not contain sufficient backing data, was
        provided, the loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058020)
    
    These non-security issues were fixed :
    
      - Unconditionalize celt, ass, openjpeg, webp, libva,
        vdpau.
    
      - Build unconditionally with lame and twolame
    
      - Enable AC3 and MP3 decoding to match
        multimedia:libs/ffmpeg (3.x)
    
    For ffmpeg it updates to version 3.3.4 and fixes several issues.
    
    These security issues were fixed :
    
      - CVE-2017-14225: The av_color_primaries_name function may
        have returned a NULL pointer depending on a value
        contained in a file, but callers did not anticipate
        this, leading to a NULL pointer dereference
        (bsc#1058018).
    
      - CVE-2017-14223: Prevent DoS in asf_build_simple_index()
        due to lack of an EOF (End of File) check that might
        have caused huge CPU consumption. When a crafted ASF
        file, which claims a large 'ict' field in the header but
        did not contain sufficient backing data, was provided,
        the for loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058019).
    
      - CVE-2017-14222: Prevent DoS in read_tfra() due to lack
        of an EOF (End of File) check that might have caused
        huge CPU and memory consumption. When a crafted MOV
        file, which claims a large 'item_count' field in the
        header but did not contain sufficient backing data, was
        provided, the loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058020).
    
      - CVE-2017-14058: The read_data function in
        libavformat/hls.c did not restrict reload attempts for
        an insufficient list, which allowed remote attackers to
        cause a denial of service (infinite loop) (bsc#1056762)
    
      - CVE-2017-14057: In asf_read_marker() due to lack of an
        EOF (End of File) check might have caused huge CPU and
        memory consumption. When a crafted ASF file, which
        claims a large 'name_len' or 'count' field in the header
        but did not contain sufficient backing data, was
        provided, the loops over the name and markers would
        consume huge CPU and memory resources, since there is no
        EOF check inside these loops (bsc#1056761)
    
      - CVE-2017-14059: A DoS in cine_read_header() due to lack
        of an EOF check might have caused huge CPU and memory
        consumption. When a crafted CINE file, which claims a
        large 'duration' field in the header but did not contain
        sufficient backing data, was provided, the image-offset
        parsing loop would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056763)
    
      - CVE-2017-14054: A DoS in ivr_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        consumption. When a crafted IVR file, which claims a
        large 'len' field in the header but did not contain
        sufficient backing data, was provided, the first type==4
        loop would consume huge CPU resources, since there is no
        EOF check inside the loop (bsc#1056765).
    
      - CVE-2017-14056: A DoS in rl2_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted RL2 file, which
        claims a large 'frame_count' field in the header but did
        not contain sufficient backing data, was provided, the
        loops (for offset and size tables) would consume huge
        CPU and memory resources, since there is no EOF check
        inside these loops (bsc#1056760)
    
      - CVE-2017-14055: a DoS in mv_read_header() due to lack of
        an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted MV file, which
        claims a large 'nb_frames' field in the header but did
        not contain sufficient backing data, was provided, the
        loop over the frames would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056766)
    
      - CVE-2017-11399: Integer overflow in the ape_decode_frame
        function allowed remote attackers to cause a denial of
        service (out-of-array access and application crash) or
        possibly have unspecified other impact via a crafted APE
        file (bsc#1049095).
    
      - CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header()
        due to lack of an EOF (End of File) check taht might
        have caused huge CPU consumption. When a crafted NSV
        file, which claims a large 'table_entries_used' field in
        the header but did not contain sufficient backing data,
        was provided, the loop over 'table_entries_used' would
        consume huge CPU resources, since there was no EOF check
        inside the loop (bsc#1057539)
    
      - CVE-2017-14170: Prevent DoS in
        mxf_read_index_entry_array() due to lack of an EOF (End
        of File) check that might have caused huge CPU
        consumption. When a crafted MXF file, which claims a
        large 'nb_index_entries' field in the header but did not
        contain sufficient backing data, was provided, the loop
        would consume huge CPU resources, since there was no EOF
        check inside the loop. Moreover, this big loop can be
        invoked multiple times if there is more than one
        applicable data segment in the crafted MXF file
        (bsc#1057537)
    
      - CVE-2017-14169: In the mxf_read_primer_pack function an
        integer signedness error have might occured when a
        crafted file, which claims a large 'item_num' field such
        as 0xffffffff, was provided. As a result, the variable
        'item_num' turns negative, bypassing the check for a
        large value (bsc#1057536)
    
    It also includes various fixes for integer overflows and too-large bit
    shifts that didn't receive a CVE.
    
    These non-security issues were fixed :
    
      - Unconditionalize celt, ass, openjpeg, webp, netcdf,
        libva, vdpau.
    
      - Build unconditionally with lame and twolame
    
      - Enabled cuda and cuvid for unrestricted build.
    
      - Add additional checks to ensure MPEG is off"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1015120"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1022920"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1022921"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1022922"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1034176"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1034177"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1034179"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046211"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1049095"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056760"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056761"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056762"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056763"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056765"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056766"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057536"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057537"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057539"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058018"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058019"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058020"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ffmpeg / ffmpeg2 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg2-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg2-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-mp3rtp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-mp3rtp-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame-debugsource");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/09/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/09/18");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.3", reference:"ffmpeg-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ffmpeg-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ffmpeg-debugsource-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ffmpeg2-debugsource-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ffmpeg2-devel-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"lame-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"lame-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"lame-debugsource-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"lame-mp3rtp-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"lame-mp3rtp-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavcodec-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavcodec56-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavcodec56-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavcodec57-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavcodec57-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavdevice-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavdevice56-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavdevice56-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavdevice57-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavdevice57-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavfilter-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavfilter5-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavfilter5-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavfilter6-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavfilter6-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavformat-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavformat56-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavformat56-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavformat57-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavformat57-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavresample-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavresample2-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavresample2-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavresample3-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavresample3-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavutil-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavutil54-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavutil54-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavutil55-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libavutil55-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libmp3lame-devel-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libmp3lame0-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libmp3lame0-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libpostproc-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libpostproc53-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libpostproc53-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libpostproc54-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libpostproc54-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswresample-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswresample1-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswresample1-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswresample2-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswresample2-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswscale-devel-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswscale3-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswscale3-debuginfo-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswscale4-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libswscale4-debuginfo-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libtwolame-devel-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libtwolame0-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libtwolame0-debuginfo-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"twolame-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"twolame-debuginfo-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"twolame-debugsource-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavcodec56-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavcodec56-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavcodec57-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavcodec57-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavdevice56-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavdevice56-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavdevice57-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavdevice57-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavfilter5-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavfilter5-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavfilter6-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavfilter6-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavformat56-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavformat56-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavformat57-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavformat57-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavresample2-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavresample2-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavresample3-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavresample3-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavutil54-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavutil54-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavutil55-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libavutil55-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmp3lame0-32bit-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmp3lame0-debuginfo-32bit-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libpostproc53-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libpostproc53-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libpostproc54-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libpostproc54-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswresample1-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswresample1-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswresample2-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswresample2-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswscale3-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswscale3-debuginfo-32bit-2.8.13-32.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswscale4-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libswscale4-debuginfo-32bit-3.3.4-7.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libtwolame0-32bit-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libtwolame0-debuginfo-32bit-0.3.13-2.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ffmpeg / ffmpeg-debuginfo / ffmpeg-debugsource / libavcodec-devel / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-1068.NASL
    descriptionThis update introduces lame and twolame. For ffmpeg2 it updates to version 2.8.13 and fixes several issues. These security issues were fixed : - CVE-2017-14058: The read_data function in libavformat/hls.c did not restrict reload attempts for an insufficient list, which allowed remote attackers to cause a denial of service (infinite loop) (bsc#1056762) - CVE-2017-14057: In asf_read_marker() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted ASF file, which claims a large
    last seen2020-06-05
    modified2017-09-18
    plugin id103290
    published2017-09-18
    reporterThis script is Copyright (C) 2017-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/103290
    titleopenSUSE Security Update : ffmpeg / ffmpeg2 (openSUSE-2017-1068)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2017-1068.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(103290);
      script_version("3.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2017-11399", "CVE-2017-14054", "CVE-2017-14055", "CVE-2017-14056", "CVE-2017-14057", "CVE-2017-14058", "CVE-2017-14059", "CVE-2017-14169", "CVE-2017-14170", "CVE-2017-14171", "CVE-2017-14222", "CVE-2017-14223", "CVE-2017-14225");
    
      script_name(english:"openSUSE Security Update : ffmpeg / ffmpeg2 (openSUSE-2017-1068)");
      script_summary(english:"Check for the openSUSE-2017-1068 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update introduces lame and twolame.
    
    For ffmpeg2 it updates to version 2.8.13 and fixes several issues.
    
    These security issues were fixed :
    
      - CVE-2017-14058: The read_data function in
        libavformat/hls.c did not restrict reload attempts for
        an insufficient list, which allowed remote attackers to
        cause a denial of service (infinite loop) (bsc#1056762)
    
      - CVE-2017-14057: In asf_read_marker() due to lack of an
        EOF (End of File) check might have caused huge CPU and
        memory consumption. When a crafted ASF file, which
        claims a large 'name_len' or 'count' field in the header
        but did not contain sufficient backing data, was
        provided, the loops over the name and markers would
        consume huge CPU and memory resources, since there is no
        EOF check inside these loops (bsc#1056761)
    
      - CVE-2017-14059: A DoS in cine_read_header() due to lack
        of an EOF check might have caused huge CPU and memory
        consumption. When a crafted CINE file, which claims a
        large 'duration' field in the header but did not contain
        sufficient backing data, was provided, the image-offset
        parsing loop would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056763)
    
      - CVE-2017-14056: A DoS in rl2_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted RL2 file, which
        claims a large 'frame_count' field in the header but did
        not contain sufficient backing data, was provided, the
        loops (for offset and size tables) would consume huge
        CPU and memory resources, since there is no EOF check
        inside these loops (bsc#1056760)
    
      - CVE-2017-14055: a DoS in mv_read_header() due to lack of
        an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted MV file, which
        claims a large 'nb_frames' field in the header but did
        not contain sufficient backing data, was provided, the
        loop over the frames would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056766)
    
      - boo#1046211: Lots of integer overflow fixes
    
      - CVE-2017-14169: In the mxf_read_primer_pack function an
        integer signedness error have might occured when a
        crafted file, which claims a large 'item_num' field such
        as 0xffffffff, was provided. As a result, the variable
        'item_num' turns negative, bypassing the check for a
        large value (bsc#1057536)
    
      - CVE-2017-14170: Prevent DoS in
        mxf_read_index_entry_array() due to lack of an EOF (End
        of File) check that might have caused huge CPU
        consumption. When a crafted MXF file, which claims a
        large 'nb_index_entries' field in the header but did not
        contain sufficient backing data, was provided, the loop
        would consume huge CPU resources, since there was no EOF
        check inside the loop. Moreover, this big loop can be
        invoked multiple times if there is more than one
        applicable data segment in the crafted MXF file
        (bsc#1057537)
    
      - CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header()
        due to lack of an EOF (End of File) check taht might
        have caused huge CPU consumption. When a crafted NSV
        file, which claims a large 'table_entries_used' field in
        the header but did not contain sufficient backing data,
        was provided, the loop over 'table_entries_used' would
        consume huge CPU resources, since there was no EOF check
        inside the loop (bsc#1057539)
    
      - !: CVE-2017-14223: Prevent DoS in
        asf_build_simple_index() due to lack of an EOF (End of
        File) check that might have caused huge CPU consumption.
        When a crafted ASF file, which claims a large 'ict'
        field in the header but did not contain sufficient
        backing data, was provided, the for loop would consume
        huge CPU and memory resources, since there was no EOF
        check inside the loop (bsc#1058019)
    
      - !: CVE-2017-14222: Prevent DoS in read_tfra() due to
        lack of an EOF (End of File) check that might have
        caused huge CPU and memory consumption. When a crafted
        MOV file, which claims a large 'item_count' field in the
        header but did not contain sufficient backing data, was
        provided, the loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058020)
    
    These non-security issues were fixed :
    
      - Unconditionalize celt, ass, openjpeg, webp, libva,
        vdpau.
    
      - Build unconditionally with lame and twolame
    
    For ffmpeg it updates to version 3.3.4 and fixes several issues.
    
    These security issues were fixed :
    
      - CVE-2017-14058: The read_data function in
        libavformat/hls.c did not restrict reload attempts for
        an insufficient list, which allowed remote attackers to
        cause a denial of service (infinite loop) (bsc#1056762)
    
      - CVE-2017-14057: In asf_read_marker() due to lack of an
        EOF (End of File) check might have caused huge CPU and
        memory consumption. When a crafted ASF file, which
        claims a large 'name_len' or 'count' field in the header
        but did not contain sufficient backing data, was
        provided, the loops over the name and markers would
        consume huge CPU and memory resources, since there is no
        EOF check inside these loops (bsc#1056761)
    
      - CVE-2017-14059: A DoS in cine_read_header() due to lack
        of an EOF check might have caused huge CPU and memory
        consumption. When a crafted CINE file, which claims a
        large 'duration' field in the header but did not contain
        sufficient backing data, was provided, the image-offset
        parsing loop would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056763)
    
      - CVE-2017-14054: A DoS in ivr_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        consumption. When a crafted IVR file, which claims a
        large 'len' field in the header but did not contain
        sufficient backing data, was provided, the first type==4
        loop would consume huge CPU resources, since there is no
        EOF check inside the loop (bsc#1056765)
    
      - CVE-2017-14056: A DoS in rl2_read_header() due to lack
        of an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted RL2 file, which
        claims a large 'frame_count' field in the header but did
        not contain sufficient backing data, was provided, the
        loops (for offset and size tables) would consume huge
        CPU and memory resources, since there is no EOF check
        inside these loops (bsc#1056760)
    
      - CVE-2017-14055: a DoS in mv_read_header() due to lack of
        an EOF (End of File) check might have caused huge CPU
        and memory consumption. When a crafted MV file, which
        claims a large 'nb_frames' field in the header but did
        not contain sufficient backing data, was provided, the
        loop over the frames would consume huge CPU and memory
        resources, since there is no EOF check inside the loop
        (bsc#1056766)
    
      - CVE-2017-11399: Integer overflow in the ape_decode_frame
        function allowed remote attackers to cause a denial of
        service (out-of-array access and application crash) or
        possibly have unspecified other impact via a crafted APE
        file (bsc#1049095)
    
      - CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header()
        due to lack of an EOF (End of File) check taht might
        have caused huge CPU consumption. When a crafted NSV
        file, which claims a large 'table_entries_used' field in
        the header but did not contain sufficient backing data,
        was provided, the loop over 'table_entries_used' would
        consume huge CPU resources, since there was no EOF check
        inside the loop (bsc#1057539)
    
      - CVE-2017-14170: Prevent DoS in
        mxf_read_index_entry_array() due to lack of an EOF (End
        of File) check that might have caused huge CPU
        consumption. When a crafted MXF file, which claims a
        large 'nb_index_entries' field in the header but did not
        contain sufficient backing data, was provided, the loop
        would consume huge CPU resources, since there was no EOF
        check inside the loop. Moreover, this big loop can be
        invoked multiple times if there is more than one
        applicable data segment in the crafted MXF file
        (bsc#1057537)
    
      - CVE-2017-14169: In the mxf_read_primer_pack function an
        integer signedness error have might occured when a
        crafted file, which claims a large 'item_num' field such
        as 0xffffffff, was provided. As a result, the variable
        'item_num' turns negative, bypassing the check for a
        large value (bsc#1057536)
    
      - CVE-2017-14225: The av_color_primaries_name function may
        have returned a NULL pointer depending on a value
        contained in a file, but callers did not anticipate
        this, leading to a NULL pointer dereference
        (bsc#1058018)
    
      - CVE-2017-14223: Prevent DoS in asf_build_simple_index()
        due to lack of an EOF (End of File) check that might
        have caused huge CPU consumption. When a crafted ASF
        file, which claims a large 'ict' field in the header but
        did not contain sufficient backing data, was provided,
        the for loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058019)
    
      - CVE-2017-14222: Prevent DoS in read_tfra() due to lack
        of an EOF (End of File) check that might have caused
        huge CPU and memory consumption. When a crafted MOV
        file, which claims a large 'item_count' field in the
        header but did not contain sufficient backing data, was
        provided, the loop would consume huge CPU and memory
        resources, since there was no EOF check inside the loop
        (bsc#1058020)
    
    It also includes various fixes for integer overflows and too-large bit
    shifts that didn't receive a CVE.
    
    These non-security issues were fixed :
    
      - Unconditionalize celt, ass, openjpeg, webp, netcdf,
        libva, vdpau.
    
      - Build unconditionally with lame and twolame
    
      - boo#1041794: Disable cuda extensions
    
      - Add additional checks to ensure MPEG is off"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1041794"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046211"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1049095"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056760"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056761"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056762"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056763"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056765"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056766"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057536"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057537"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1057539"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058018"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058019"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058020"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ffmpeg / ffmpeg2 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg2-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ffmpeg2-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-mp3rtp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:lame-mp3rtp-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavcodec57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavdevice57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter5-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavfilter6-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat56-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavformat57-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample2-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavresample3-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil54-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libavutil55-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc53-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpostproc54-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample1-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswresample2-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale3-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libswscale4-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtwolame0-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:twolame-debugsource");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/09/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/09/18");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.2", reference:"ffmpeg-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"ffmpeg-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"ffmpeg-debugsource-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"ffmpeg2-debugsource-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"ffmpeg2-devel-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"lame-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"lame-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"lame-debugsource-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"lame-mp3rtp-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"lame-mp3rtp-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavcodec-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavcodec56-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavcodec56-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavcodec57-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavcodec57-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavdevice-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavdevice56-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavdevice56-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavdevice57-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavdevice57-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavfilter-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavfilter5-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavfilter5-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavfilter6-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavfilter6-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavformat-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavformat56-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavformat56-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavformat57-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavformat57-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavresample-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavresample2-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavresample2-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavresample3-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavresample3-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavutil-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavutil54-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavutil54-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavutil55-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libavutil55-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libmp3lame-devel-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libmp3lame0-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libmp3lame0-debuginfo-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpostproc-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpostproc53-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpostproc53-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpostproc54-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpostproc54-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswresample-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswresample1-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswresample1-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswresample2-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswresample2-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswscale-devel-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswscale3-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswscale3-debuginfo-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswscale4-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libswscale4-debuginfo-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libtwolame-devel-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libtwolame0-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libtwolame0-debuginfo-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"twolame-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"twolame-debuginfo-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"twolame-debugsource-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavcodec56-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavcodec56-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavcodec57-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavcodec57-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavdevice56-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavdevice56-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavdevice57-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavdevice57-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavfilter5-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavfilter5-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavfilter6-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavfilter6-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavformat56-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavformat56-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavformat57-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavformat57-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavresample2-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavresample2-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavresample3-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavresample3-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavutil54-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavutil54-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavutil55-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libavutil55-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmp3lame0-32bit-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmp3lame0-debuginfo-32bit-3.99.5-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libpostproc53-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libpostproc53-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libpostproc54-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libpostproc54-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswresample1-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswresample1-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswresample2-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswresample2-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswscale3-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswscale3-debuginfo-32bit-2.8.13-25.10.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswscale4-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libswscale4-debuginfo-32bit-3.3.4-6.16.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libtwolame0-32bit-0.3.13-2.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libtwolame0-debuginfo-32bit-0.3.13-2.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ffmpeg / ffmpeg-debuginfo / ffmpeg-debugsource / libavcodec-devel / etc");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1630.NASL
    descriptionSeveral security vulnerabilities were corrected in the libav multimedia library which may lead to a denial of service, information disclosure or the execution of arbitrary code if a malformed file is processed. CVE-2017-9993 Libav does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data. CVE-2017-9994 libavcodec/webp.c in Libav does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions. CVE-2017-14055 denial of service in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. CVE-2017-14056 denial of service in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. CVE-2017-14057 denial of service in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. CVE-2017-14170 denial of service in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. CVE-2017-14171 denial of service in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. CVE-2017-14767 The sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets values, which allows remote attackers to cause a denial of service (heap buffer overflow) or possibly have unspecified other impact via a crafted sdp file. CVE-2017-15672 The read_header function in libavcodec/ffv1dec.c allows remote attackers to have unspecified impact via a crafted MP4 file, which triggers an out-of-bounds read. CVE-2017-17130 The ff_free_picture_tables function in libavcodec/mpegpicture.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv. CVE-2018-6621 The decode_frame function in libavcodec/utvideodec.c in Libav allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file. CVE-2018-7557 The decode_init function in libavcodec/utvideodec.c in Libav allows remote attackers to cause a denial of service (Out of array read) via an AVI file with crafted dimensions within chroma subsampling data. CVE-2018-14394 libavformat/movenc.c in Libav allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted Waveform audio file. CVE-2018-1999010 Libav contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. For Debian 8
    last seen2020-03-17
    modified2019-01-08
    plugin id120988
    published2019-01-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120988
    titleDebian DLA-1630-1 : libav security update
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3996.NASL
    descriptionSeveral vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed Real, MV, RL2, ASF, Apple HLS, Phantom Cine, MXF, NSV, MOV or RTP H.264 files/streams are processed.
    last seen2020-06-01
    modified2020-06-02
    plugin id103758
    published2017-10-11
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103758
    titleDebian DSA-3996-1 : ffmpeg - security update
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_ED73829DAF6D11E7A633009C02A2AB30.NASL
    descriptionFFmpeg security reports : Multiple vulnerabilities have been fixed in FFmpeg 3.3.4. Please refer to the CVE list for details.
    last seen2020-06-01
    modified2020-06-02
    plugin id103844
    published2017-10-16
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103844
    titleFreeBSD : FFmpeg -- multiple vulnerabilities (ed73829d-af6d-11e7-a633-009c02a2ab30)