[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: Re: [oss-security] ffmpeg afl bugs
From:       cookieopfer () gmx ! net
Date:       2016-09-26 16:59:13
Message-ID: trinity-b2af326d-8386-44cc-b86d-1b0b3ef0e180-1474909153354 () 3capp-gmx-bs10
[Download RAW message or body]

Hi Hanno,


so, in that case a the CVE should be rejected, with regard to the
old CVE.


> Hello,

On Mon, 26 Sep 2016 01:45:40 -0400 (EDT)
cve-assign () mitre org wrote:

        overread end of atom 'stsd' by 4294967134 bytes  


    Use CVE-2016-7554.


I don't think this is any vuln.

This is a warning message from ffmpeg itself, not from any memory
safety tool. Thus I interpret this as "this file is garbled and would
overread if we'd do what the file offsets indicate".

It probably indicated a bug that Michal originally found with this
file, but that happened long ago. The file is from Dec 2014 (looks like
this [1]).


[1] https://ffmpeg.org/pipermail/ffmpeg-cvslog/2014-December/084342.html
-- 
Hanno Böck
https://hboeck.de/

mail/jabber: hanno () hboeck de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Attachment: _bin
Description: OpenPGP digital signature
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic