CVE-2016-2328

Published on: 02/11/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Ffmpeg from Ffmpeg contain the following vulnerability:

libswscale/swscale_unscaled.c in FFmpeg before 2.8.6 does not validate certain height values, which allows remote attackers to cause a denial of service (out-of-bounds array read access) or possibly have unspecified other impact via a crafted .cine file, related to the bayer_to_rgb24_wrapper and bayer_to_yv12_wrapper functions.

  • CVE-2016-2328 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
git.videolan.org Git - ffmpeg.git/commit Patch
Vendor Advisory
git.videolan.org
text/xml
URL Logo CONFIRM git.videolan.org/?p=ffmpeg.git;a=commit;h=ad3b6fa7d83db7de951ed891649af93a47e74be5
git.videolan.org Git - ffmpeg.git/commit Patch
Vendor Advisory
git.videolan.org
text/xml
URL Logo CONFIRM git.videolan.org/?p=ffmpeg.git;a=commit;h=757248ea3cd917a7755cb15f817a9b1f15578718
FFmpeg Processing Flaws Lets Remote Users Cause the Target Application or Service to Crash - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1035010
FFmpeg: Multiple vulnerabilities (GLSA 201606-09) — Gentoo security Third Party Advisory
VDB Entry
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201606-09

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFfmpegFfmpegAllAllAllAll
  • cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*: