USN-734-1: FFmpeg vulnerabilities

Ubuntu Security Notice USN-734-1

16th March, 2009

ffmpeg, ffmpeg-debian vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 7.10

Software description

  • ffmpeg
  • ffmpeg-debian

Details

It was discovered that FFmpeg did not correctly handle certain malformed
Ogg Media (OGM) files. If a user were tricked into opening a crafted Ogg
Media file, an attacker could cause the application using FFmpeg to crash,
leading to a denial of service. (CVE-2008-4610)

It was discovered that FFmpeg did not correctly handle certain parameters
when creating DTS streams. If a user were tricked into processing certain
commands, an attacker could cause a denial of service via application
crash, or possibly execute arbitrary code with the privileges of the user
invoking the program. This issue only affected Ubuntu 8.10. (CVE-2008-4866)

It was discovered that FFmpeg did not correctly handle certain malformed
DTS Coherent Acoustics (DCA) files. If a user were tricked into opening a
crafted DCA file, an attacker could cause a denial of service via
application crash, or possibly execute arbitrary code with the privileges
of the user invoking the program. (CVE-2008-4867)

It was discovered that FFmpeg did not correctly handle certain malformed 4X
movie (4xm) files. If a user were tricked into opening a crafted 4xm file,
an attacker could execute arbitrary code with the privileges of the user
invoking the program. (CVE-2009-0385)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 8.10:
libavformat52 3:0.svn20080206-12ubuntu3.1
libavcodec51 3:0.svn20080206-12ubuntu3.1
Ubuntu 8.04 LTS:
libavformat1d 3:0.cvs20070307-5ubuntu7.3
libavcodec1d 3:0.cvs20070307-5ubuntu7.3
Ubuntu 7.10:
libavformat1d 3:0.cvs20070307-5ubuntu4.2
libavcodec1d 3:0.cvs20070307-5ubuntu4.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

CVE-2008-4610, CVE-2008-4866, CVE-2008-4867, CVE-2009-0385