Vulnerability Details : CVE-2015-8662
The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg before 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2015-8662
Probability of exploitation activity in the next 30 days: 0.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 66 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-8662
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
7.3
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
NIST |
CWE ids for CVE-2015-8662
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8662
-
http://www.securitytracker.com/id/1034539
FFmpeg Array Access Errors Let Remote Users Cause the Target Application to Crash - SecurityTracker
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00004.html
[security-announce] openSUSE-SU-2016:0089-1: important: Security update
-
http://git.videolan.org/?p=ffmpeg.git;a=commit;h=75422280fbcdfbe9dc56bde5525b4d8b280f1bc5
git.videolan.org Git - ffmpeg.git/commit
-
https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html
[SECURITY] [DLA 1611-1] libav security update
Products affected by CVE-2015-8662
- cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*