![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.67350 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu USN-931-2 (ffmpeg-debian) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to ffmpeg-debian announced via advisory USN-931-2. Details follow: USN-931-1 fixed vulnerabilities in FFmpeg. The update introduced a regression when trying to play certain multimedia files. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that FFmpeg contained multiple security issues when handling certain multimedia files. If a user were tricked into opening a crafted multimedia file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Solution: The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: libavcodec1d 3:0.cvs20070307-5ubuntu7.5 libavformat1d 3:0.cvs20070307-5ubuntu7.5 Ubuntu 8.10: libavcodec51 3:0.svn20080206-12ubuntu3.3 libavformat52 3:0.svn20080206-12ubuntu3.3 Ubuntu 9.04: libavcodec52 3:0.svn20090303-1ubuntu6.2 libavformat52 3:0.svn20090303-1ubuntu6.2 Ubuntu 9.10: libavcodec52 4:0.5+svn20090706-2ubuntu2.2 libavformat52 4:0.5+svn20090706-2ubuntu2.2 In general, a standard system upgrade is sufficient to effect the necessary changes. http://www.securityspace.com/smysecure/catid.html?in=USN-931-2 Risk factor : High |
Copyright | Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |