Enviar #496930: FFmpeg git master NULL Pointer Dereferenceinformación

TítuloFFmpeg git master NULL Pointer Dereference
DescripciónA segmentation fault vulnerability was discovered in FFmpeg's MOV/MP4 parser implementation. The vulnerability exists in the mov_read_trak function within libavformat/mov.c (line 5209). When processing a specially crafted media file, the function attempts to read from a near-null memory address (0x000000000004), causing a segmentation fault.  Technical Impact: - The vulnerability leads to a segmentation fault due to null pointer dereference - This results in program termination when processing malformed input files - The issue can be exploited to cause denial of service (DoS)  The vulnerability can be reproduced by: 1. Building FFmpeg from the main branch with Address Sanitizer enabled 2. Processing a specially crafted input file with the following FFmpeg command: ./ffmpeg -y -i [poc_file] tmp.mp4  The vulnerability was confirmed using AddressSanitizer, which detected the segmentation fault during the execution of mov_read_trak() while attempting to read from an invalid memory address.  Attack Vector: - Processing a specially crafted MOV/MP4 file  Affected Components: - FFmpeg MOV/MP4 parser (libavformat/mov.c) - Function: mov_read_trak - Version: FFmpeg main branch (as of discovery date)  Impact: - Denial of Service through program crash - Potential for information disclosure Ffmpeg user : 0x20z
Fuente⚠️ https://trac.ffmpeg.org/ticket/11460#comment:1
Usuario
 0x20z (UID 81279)
Sumisión2025-02-08 09:13 (hace 1 Año)
Moderación2025-02-16 11:43 (8 days later)
EstadoAceptado
Entrada de VulDB295982 [FFmpeg hasta 7.1 MOV Parser libavformat/mov.c mov_read_trak denegación de servicio]
Puntos20

Do you need the next level of professionalism?

Upgrade your account now!