Description
Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1781-1 | New ffmpeg-debian packages fix arbitrary code execution |
Debian DSA |
DSA-1782-1 | New mplayer packages fix arbitrary code execution |
Ubuntu USN |
USN-734-1 | FFmpeg vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:31:26.167Z
Reserved: 2009-02-02T00:00:00.000Z
Link: CVE-2009-0385
No data.
Status : Modified
Published: 2009-02-02T19:30:00.327
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0385
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN