Vulnerability Description
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libav | Libav | < 0.8.13 |
Related Weaknesses (CWE)
References
- http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.htmlExploitThird Party Advisory
- http://www.openwall.com/lists/oss-security/2014/06/26/22Mailing ListThird Party Advisory
- https://libav.org/news/#2014-06-27Vendor Advisory
- http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.htmlExploitThird Party Advisory
- http://www.openwall.com/lists/oss-security/2014/06/26/22Mailing ListThird Party Advisory
- https://libav.org/news/#2014-06-27Vendor Advisory
FAQ
What is CVE-2014-4609?
CVE-2014-4609 is a vulnerability with a CVSS score of 8.8 (HIGH). Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
How severe is CVE-2014-4609?
CVE-2014-4609 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-4609?
Check the references section above for vendor advisories and patch information. Affected products include: Libav Libav.