Vulnerability Description
In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ffmpeg | Ffmpeg | 3.3.3 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3996
- http://www.securityfocus.com/bid/100631
- https://github.com/FFmpeg/FFmpeg/commit/7e80b63ecd259d69d383623e75b318bf2bd491f6PatchThird Party Advisory
- http://www.debian.org/security/2017/dsa-3996
- http://www.securityfocus.com/bid/100631
- https://github.com/FFmpeg/FFmpeg/commit/7e80b63ecd259d69d383623e75b318bf2bd491f6PatchThird Party Advisory
FAQ
What is CVE-2017-14059?
CVE-2017-14059 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but ...
How severe is CVE-2017-14059?
CVE-2017-14059 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14059?
Check the references section above for vendor advisories and patch information. Affected products include: Ffmpeg Ffmpeg.