Vulnerability Details : CVE-2015-8661
The h264_slice_header_init function in libavcodec/h264_slice.c in FFmpeg before 2.8.3 does not validate the relationship between the number of threads and the number of slices, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted H.264 data.
Vulnerability category: Denial of service
Products affected by CVE-2015-8661
- cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8661
0.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8661
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
8.3
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
3.9
|
3.7
|
NIST |
CWE ids for CVE-2015-8661
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8661
-
http://www.securitytracker.com/id/1034539
FFmpeg Array Access Errors Let Remote Users Cause the Target Application to Crash - SecurityTracker
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html
[security-announce] openSUSE-SU-2016:0089-1: important: Security update
-
http://git.videolan.org/?p=ffmpeg.git;a=commit;h=4ea4d2f438c9a7eba37980c9a87be4b34943e4d5
git.videolan.org Git - ffmpeg.git/commit
-
http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=4ea4d2f438c9a7eba37980c9a87be4b34943e4d5
git.videolan.org Git
-
https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html
[SECURITY] [DLA 1611-1] libav security update
Jump to