![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.891654 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-1654-1) |
Summary: | The remote host is missing an update for the Debian 'libav' package(s) announced via the DLA-1654-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'libav' package(s) announced via the DLA-1654-1 advisory. Vulnerability Insight: Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. CVE-2014-8542 libavcodec/utils.c omitted a certain codec ID during enforcement of alignment, which allowed remote attackers to cause a denial of ervice (out-of-bounds access) or possibly have unspecified other impact via crafted JV data. CVE-2015-1207 Double-free vulnerability in libavformat/mov.c allowed remote attackers to cause a denial of service (memory corruption and crash) via a crafted .m4a file. CVE-2017-7863 libav had an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c. CVE-2017-7865 libav had an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c. CVE-2017-14169 In the mxf_read_primer_pack function in libavformat/mxfdec.c in, an integer signedness error might have occurred when a crafted file, claiming a large item_num field such as 0xffffffff, was provided. As a result, the variable item_num turned negative, bypassing the check for a large value. CVE-2017-14223 In libavformat/asfdec_f.c a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might have caused huge CPU consumption. When a crafted ASF file, claiming a large ict field in the header but not containing sufficient backing data, was provided, the for loop would have consumed huge CPU and memory resources, since there was no EOF check inside the loop. For Debian 8 Jessie, these problems have been fixed in version 6:11.12-1~ deb8u5. We recommend that you upgrade your libav packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references] Affected Software/OS: 'libav' package(s) on Debian 8. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-8542 https://security.gentoo.org/glsa/201603-06 https://lists.debian.org/debian-lts-announce/2019/02/msg00005.html http://www.ubuntu.com/usn/USN-2534-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-1207 Common Vulnerability Exposure (CVE) ID: CVE-2017-14169 BugTraq ID: 100692 http://www.securityfocus.com/bid/100692 Debian Security Information: DSA-3996 (Google Search) http://www.debian.org/security/2017/dsa-3996 Common Vulnerability Exposure (CVE) ID: CVE-2017-14223 BugTraq ID: 100703 http://www.securityfocus.com/bid/100703 Common Vulnerability Exposure (CVE) ID: CVE-2017-7863 BugTraq ID: 97675 http://www.securityfocus.com/bid/97675 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=546 https://github.com/FFmpeg/FFmpeg/commit/e477f09d0b3619f3d29173b2cd593e17e2d1978e Common Vulnerability Exposure (CVE) ID: CVE-2017-7865 BugTraq ID: 97685 http://www.securityfocus.com/bid/97685 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=452 https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb |
Copyright | Copyright (C) 2019 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |