Vulnerability Description
In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_count" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ffmpeg | Ffmpeg | 3.3.3 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3996
- http://www.securityfocus.com/bid/100701Third Party AdvisoryVDB Entry
- https://github.com/FFmpeg/FFmpeg/commit/9cb4eb772839c5e1de2855d126bf74ff16d13382Issue TrackingPatchThird Party Advisory
- http://www.debian.org/security/2017/dsa-3996
- http://www.securityfocus.com/bid/100701Third Party AdvisoryVDB Entry
- https://github.com/FFmpeg/FFmpeg/commit/9cb4eb772839c5e1de2855d126bf74ff16d13382Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2017-14222?
CVE-2017-14222 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_co...
How severe is CVE-2017-14222?
CVE-2017-14222 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14222?
Check the references section above for vendor advisories and patch information. Affected products include: Ffmpeg Ffmpeg.