FFmpeg 2.0 libavcodec/ansi.c decode_frame integer coercion

A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function decode_frame of the file libavcodec/ansi.c. The manipulation leads to integer coercion error. The CWE definition for the vulnerability is CWE-192. The issue has been introduced in 07/11/2013. The weakness was released 02/16/2014 by Mateusz Jurczyk and Gynvael Coldwind (j00ru) with Google Security Team as avcodec/ansi: fix integer overflow as GIT Commit (GIT Repository). It is possible to read the advisory at git.videolan.org. This vulnerability is known as CVE-2014-125011. The attack can be launched remotely. Technical details are available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment. The vulnerability was handled as a non-public zero-day exploit for at least 220 days. We expect the 0-day to have been worth approximately $0-$5k. The bugfix is ready for download at git.videolan.org. It is recommended to apply a patch to fix this issue. A possible mitigation has been published even before and not after the disclosure of the vulnerability. The vulnerability is also documented other vulnerability databases: SecurityFocus (BID 65671), X-Force (91256) and Secunia (SA57066).

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

1136
16

Field

exploit_price_0day2
cna_responsible1
source_cve1
source_securityfocus_class1
source_securityfocus_date1

Commit Conf

100%43
90%9
60%8
68%4

Approve Conf

100%43
90%9
60%8
68%4
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1263242906/17/2022VulD...price_0day$0-$5ksee exploit price documentation06/17/2022accepted
90
1263242806/17/2022VulD...responsibleVulDB06/17/2022accepted
100
1263242706/17/2022VulD...cveCVE-2014-125011cve.org06/17/2022accepted
100
97261504/17/2019VulD...securityfocus_classBoundary Condition Errorsecurityfocus.com04/17/2019accepted
100
97261404/17/2019VulD...securityfocus_date1392681600 (02/18/2014)securityfocus.com04/17/2019accepted
100
97261004/17/2019VulD...secunia_date1392768000 (02/19/2014)flexerasoftware.com04/17/2019accepted
100
97260204/17/2019VulD...person_nicknamej00ru04/17/2019accepted
100
97263702/24/2014VulD...cvss3_vuldb_aNsee CVSS documentation02/24/2014accepted
60
97263602/24/2014VulD...cvss3_vuldb_iLsee CVSS documentation02/24/2014accepted
60
97263502/24/2014VulD...cvss3_vuldb_cNsee CVSS documentation02/24/2014accepted
60
97263402/24/2014VulD...cvss3_vuldb_sUsee CVSS documentation02/24/2014accepted
60
97263302/24/2014VulD...cvss3_vuldb_uiNsee CVSS documentation02/24/2014accepted
60
97263202/24/2014VulD...cvss3_vuldb_prNsee CVSS documentation02/24/2014accepted
60
97263102/24/2014VulD...cvss3_vuldb_acLsee CVSS documentation02/24/2014accepted
60
97263002/24/2014VulD...cvss3_vuldb_avNsee CVSS documentation02/24/2014accepted
60
97262902/24/2014VulD...0day_days22002/24/2014accepted
90
97262802/24/2014VulD...cvss3_vuldb_rcCsee CVSS documentation02/24/2014accepted
90
97262702/24/2014VulD...cvss3_vuldb_rlOsee CVSS documentation02/24/2014accepted
90
97262602/24/2014VulD...cvss3_vuldb_eUsee CVSS documentation02/24/2014accepted
90
97262502/24/2014VulD...cvss2_vuldb_rcCsee CVSS documentation02/24/2014accepted
90

44 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!