Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.8.9"
},
{
"introduced": "0"
},
{
"last_affected": "3.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "3.1"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.5"
},
{
"introduced": "0"
},
{
"last_affected": "3.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.2.1"
}
]
}[
{
"digest": {
"length": 3861.0,
"function_hash": "54265455413115495931100378942446358680"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2016-10192-07a68142",
"target": {
"function": "http_receive_data",
"file": "ffserver.c"
},
"source": "https://github.com/ffmpeg/ffmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"145977957621285930571316406731381407558",
"157890322922176059152627140325378154171",
"146523412843575963327062660251038354018",
"151822313249723663103132816587686774223",
"239366556133619822067036311925360021864",
"209380550422533187913911620005970241935",
"327799982023172669304573051615482912275",
"51812135191346979987597501041320814555",
"62741539207270928737374147488074395989"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2016-10192-e17bdc26",
"target": {
"file": "ffserver.c"
},
"source": "https://github.com/ffmpeg/ffmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10192.json"