Vulnerability Details : CVE-2005-4048
Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes.
Vulnerability category: Overflow
Products affected by CVE-2005-4048
- cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-4048
1.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-4048
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-4048
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-4048
-
http://www.debian.org/security/2006/dsa-1004
[SECURITY] [DSA 1004-1] New vlc packages fix arbitrary code execution
-
https://usn.ubuntu.com/230-1/
404: Page not found | Ubuntu
-
http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
xine-lib, FFmpeg: Heap-based buffer overflow (GLSA 200601-06) — Gentoo security
-
http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
MPlayer: Multiple integer overflows (GLSA 200603-03) — Gentoo security
-
http://www.vupen.com/english/advisories/2005/2770
Site en constructionVendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
Mandriva
-
http://www.debian.org/security/2006/dsa-1005
[SECURITY] [DSA 1005-1] New xine-lib packages fix arbitrary code execution
-
http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
GStreamer FFmpeg plugin: Heap-based buffer overflow (GLSA 200602-01) — Gentoo security
-
http://www.us.debian.org/security/2006/dsa-992
-
http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg
404 Not Found
-
http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup
-
http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
404 Not Found
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
Mandriva
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
Mandriva
-
https://usn.ubuntu.com/230-2/
404: Page not found | Ubuntu
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
Mandriva
-
http://www.securityfocus.com/bid/15743
Patch
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
Mandriva
-
http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
Jump to