SB2019050607 - Ubuntu update for FFmpeg



SB2019050607 - Ubuntu update for FFmpeg

Published: May 6, 2019

Security Bulletin ID SB2019050607
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 20% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Assertion failure (CVE-ID: CVE-2018-15822)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to insufficient checks for an empty audio packet by the flv_write_packet function, as defined in the libavformat/flvenc.c source code file. A local attacker can access the system and execute a specially crafted application that submits malicious input to trigger an assertion failure and cause the service to crash.


2) NULL pointer dereference (CVE-ID: CVE-2019-11338)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when detecting duplicate first slices within libavcodec/hevcdec.c file. A remote attacker can trigger denial of service conditions via crafted HEVC data.


3) Buffer overflow (CVE-ID: CVE-2019-11339)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the studio profile decoder in libavcodec/mpeg4videodec.c when processing MPEG-4 video data. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Input validation error (CVE-ID: CVE-2019-9718)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the subtitle decoder in ff_htmlmarkup_to_ass() function in libavcodec/htmlsubtitles.c when processing video files in Matroska format. A remote attacker can create a specially crafted video file, pass it to the affected application and consume all available CPU resources.


5) Input validation error (CVE-ID: CVE-2019-9721)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the subtitle decoder in handle_open_brace() function in libavcodec/htmlsubtitles.c when processing video files in Matroska format. A remote attacker can create a specially crafted video file, pass it to the affected application and consume all available CPU resources.


Remediation

Install update from vendor's website.