| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.5 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as critical has been discovered in FFmpeg. This vulnerability affects the function asfrtp_parse_packet. Executing a manipulation can lead to numeric error.
This vulnerability is tracked as CVE-2011-4031. No exploit exists.
Applying a patch is advised to resolve this issue.
Details
A vulnerability was found in FFmpeg (Multimedia Processing Software). It has been declared as very critical. This vulnerability affects the function asfrtp_parse_packet. The manipulation with an unknown input leads to a numeric error vulnerability. The CWE definition for the vulnerability is CWE-189. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Integer underflow in the asfrtp_parse_packet function in libavformat/rtpdec_asf.c in FFmpeg before 0.8.3 allows remote attackers to execute arbitrary code via a crafted ASF packet.
The weakness was disclosed 05/09/2012 as MSVR/MSV as confirmed bulletin (Technet). The advisory is shared for download at technet.microsoft.com. This vulnerability was named CVE-2011-4031 since 10/11/2011. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 12/01/2021).
The vulnerability scanner Nessus provides a plugin with the ID 69412 (FreeBSD : gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav (4d087b35-0990-11e3-a9f4-bcaec565249c)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks.
Applying the patch MSVR/MSV is able to eliminate this problem. The bugfix is ready for download at technet.microsoft.com.
The vulnerability is also documented in the databases at Tenable (69412) and Vulnerability Center (SBV-36343†). The entries VDB-6007, VDB-7165, VDB-61718 and VDB-61717 are pretty similar. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Name
Version
- 0.3
- 0.3.1
- 0.3.2
- 0.3.3
- 0.3.4
- 0.4.0
- 0.4.2
- 0.4.3
- 0.4.4
- 0.4.5
- 0.4.6
- 0.4.7
- 0.4.8
- 0.4.9
- 0.4.9 Pre1
- 0.5
- 0.5.1
- 0.5.2
- 0.5.3
- 0.5.4
- 0.6
- 0.6.1
- 0.6.2
- 0.7.1
- 0.7.2
- 0.7.3
- 0.8.0
- 0.8.1
- 0.8.2
License
Website
- Product: https://ffmpeg.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.5
VulDB Base Score: 10.0
VulDB Temp Score: 9.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 69412
Nessus Name: FreeBSD : gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav (4d087b35-0990-11e3-a9f4-bcaec565249c)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 841046
OpenVAS Name: Ubuntu Update for libav USN-1478-1
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: MSVR/MSV
Timeline
10/11/2011 🔍05/09/2012 🔍
05/09/2012 🔍
05/09/2012 🔍
10/04/2012 🔍
03/23/2015 🔍
12/01/2021 🔍
Sources
Product: ffmpeg.orgAdvisory: MSVR/MSV
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2011-4031 (🔍)
GCVE (CVE): GCVE-0-2011-4031
GCVE (VulDB): GCVE-100-60712
OVAL: 🔍
Vulnerability Center: 36343 - FFmpeg \x3C0.8.3 Integer Underflow Allows Remtoe Code Execution via a Specially Crafted ASF Packet, High
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 12/01/2021 18:01
Changes: 03/23/2015 16:50 (57), 04/17/2017 11:49 (11), 12/01/2021 18:01 (2)
Complete: 🔍
Cache ID: 216:F3E:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.