CVE-2016-7393

Published on: 02/15/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Certain versions of Libav from Libav contain the following vulnerability:

Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.

  • CVE-2016-7393 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
git.libav.org Git - libav.git/commit Issue Tracking
Patch
Third Party Advisory
git.libav.org
text/xml
URL Logo CONFIRM git.libav.org/?p=libav.git;a=commit;h=fb1473080223a634b8ac2cca48a632d037a0a69d
Libav CVE-2016-7393 Stack Based Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92902
oss-security - Re: libav: out-of-bounds stack read Mailing List
Patch
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160910 Re: libav: out-of-bounds stack read
libav: stack-based buffer overflow in aac_sync (aac_parser.c) | agostino's blog Patch
Third Party Advisory
VDB Entry
blogs.gentoo.org
text/html
URL Logo MISC blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLibavLibavAllAllAllAll
  • cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*: