إرسال #496929: FFmpeg git master stack-buffer-overflowالمعلومات

عنوانFFmpeg git master stack-buffer-overflow
الوصفA stack buffer overflow vulnerability was discovered in FFmpeg's AAC encoder implementation. The vulnerability exists in the ff_aac_search_for_tns function within libavcodec/aacenc_tns.c (line 204). When encoding audio with specific AAC parameters (aac_pred true and profile:a aac_low), the function attempts to read 4 bytes at an offset that exceeds the bounds of the 'en' stack buffer, which is only 8 bytes in size (allocated at line 183).  Technical Impact: - The vulnerability leads to a stack buffer overflow when reading memory 4 bytes beyond the allocated buffer - This could potentially be exploited to cause memory corruption or program crashes - In certain scenarios, this might lead to arbitrary code execution  The issue can be reproduced by: 1. Building FFmpeg from the main branch with Address Sanitizer enabled 2. Processing a specially crafted input file with the following FFmpeg command: ./ffmpeg -i [input_file] -aac_pred true -profile:a aac_low output.mpd  The vulnerability was confirmed using AddressSanitizer, which detected the buffer overflow during the execution of ff_aac_search_for_tns().  Affected Component: FFmpeg AAC encoder (libavcodec/aacenc_tns.c) Affected Function: ff_aac_search_for_tns Affected Version: FFmpeg main branch (as of discovery date) Attack Vector: Processing a specially crafted audio file FFmpeg user: 0x20z
المصدر⚠️ https://trac.ffmpeg.org/ticket/11418#comment:3
المستخدم
 0x20z (UID 81279)
ارسال08/02/2025 09:05 AM (1 سنة منذ)
الاعتدال22/02/2025 11:10 PM (15 days later)
الحالةتمت الموافقة
إدخال VulDB296589 [FFmpeg حتى 7.1 AAC Encoder libavcodec/aacenc_tns.c ff_aac_search_for_tns تلف الذاكرة]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!