FFmpeg up to 2.1.3 libavcodec/msrle.c msrle_decode_frame numeric error
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability was found in FFmpeg up to 2.1.3. It has been classified as problematic. The impacted element is the function msrle_decode_frame of the file libavcodec/msrle.c. Performing a manipulation results in numeric error.
This vulnerability is identified as CVE-2014-2099. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
Details
A vulnerability classified as problematic has been found in FFmpeg up to 2.1.3 (Multimedia Processing Software). This affects the function msrle_decode_frame of the file libavcodec/msrle.c. The manipulation with an unknown input leads to a numeric error vulnerability. CWE is classifying the issue as CWE-189. This is going to have an impact on availability. The summary by CVE is:
The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Microsoft RLE video data.
The issue has been introduced in 07/11/2013. The weakness was released 03/10/2014 as avcodec/msrle: use av_image_get_linesize() to calculate the linesize as confirmed git commit (GIT Repository). It is possible to read the advisory at git.videolan.org. This vulnerability is uniquely identified as CVE-2014-2099 since 02/24/2014. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit.
The vulnerability was handled as a non-public zero-day exploit for at least 233 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 76437 (Mandriva Linux Security Advisory : ffmpeg (MDVSA-2014:129)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Mandriva Local Security Checks and running in the context l.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.videolan.org. A possible mitigation has been published 5 months after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (91664), Tenable (76437), SecurityFocus (BID 55355†) and Secunia (SA56866†). Entries connected to this vulnerability are available at VDB-5510, VDB-9300, VDB-12389 and VDB-62232. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Name
Version
License
Website
- Product: https://ffmpeg.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 76437
Nessus Name: Mandriva Linux Security Advisory : ffmpeg (MDVSA-2014:129)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: git.videolan.org
Timeline
07/11/2013 🔍02/24/2014 🔍
03/01/2014 🔍
03/10/2014 🔍
03/10/2014 🔍
03/13/2014 🔍
07/09/2014 🔍
07/10/2014 🔍
04/12/2025 🔍
Sources
Product: ffmpeg.orgAdvisory: avcodec/msrle: use av_image_get_linesize() to calculate the linesize
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-2099 (🔍)
GCVE (CVE): GCVE-0-2014-2099
GCVE (VulDB): GCVE-100-12591
X-Force: 91664 - FFmpeg msrle_decode_frame denial of service, Medium Risk
SecurityFocus: 55355
Secunia: 56866 - FFmpeg Multiple Vulnerabilities, Moderately Critical
See also: 🔍
Entry
Created: 03/13/2014 15:25Updated: 04/12/2025 22:12
Changes: 03/13/2014 15:25 (72), 04/17/2019 09:46 (2), 04/12/2025 22:12 (17)
Complete: 🔍
Cache ID: 216:E9C:103
No comments yet. Languages: en.
Please log in to comment.