CVE-2016-1897 (GCVE-0-2016-1897)
Vulnerability from cvelistv5
Published
2016-01-15 02:00
Modified
2024-08-05 23:10
Severity ?
CWE
  • n/a
Summary
FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
References
cve@mitre.org http://habrahabr.ru/company/mailru/blog/274855 Exploit
cve@mitre.org http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html
cve@mitre.org http://security.stackexchange.com/questions/110644 Exploit
cve@mitre.org http://www.debian.org/security/2016/dsa-3506
cve@mitre.org http://www.openwall.com/lists/oss-security/2016/01/14/1
cve@mitre.org http://www.securityfocus.com/bid/80501
cve@mitre.org http://www.securitytracker.com/id/1034932
cve@mitre.org http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.529036
cve@mitre.org http://www.ubuntu.com/usn/USN-2944-1
cve@mitre.org https://security.gentoo.org/glsa/201606-09
cve@mitre.org https://security.gentoo.org/glsa/201705-08
cve@mitre.org https://www.kb.cert.org/vuls/id/772447
af854a3a-2127-422b-91ae-364da2661108 http://habrahabr.ru/company/mailru/blog/274855 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html
af854a3a-2127-422b-91ae-364da2661108 http://security.stackexchange.com/questions/110644 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2016/dsa-3506
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2016/01/14/1
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/80501
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id/1034932
af854a3a-2127-422b-91ae-364da2661108 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.529036
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/USN-2944-1
af854a3a-2127-422b-91ae-364da2661108 https://security.gentoo.org/glsa/201606-09
af854a3a-2127-422b-91ae-364da2661108 https://security.gentoo.org/glsa/201705-08
af854a3a-2127-422b-91ae-364da2661108 https://www.kb.cert.org/vuls/id/772447
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:10:39.912Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://security.stackexchange.com/questions/110644"
          },
          {
            "name": "openSUSE-SU-2016:0243",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html"
          },
          {
            "name": "1034932",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034932"
          },
          {
            "name": "GLSA-201705-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201705-08"
          },
          {
            "name": "80501",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80501"
          },
          {
            "name": "USN-2944-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2944-1"
          },
          {
            "name": "[oss-security] 20160114 Re: Fwd: FFmpeg: stealing local files with HLS+concat",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/14/1"
          },
          {
            "name": "SSA:2016-034-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.529036"
          },
          {
            "name": "DSA-3506",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3506"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://habrahabr.ru/company/mailru/blog/274855"
          },
          {
            "name": "GLSA-201606-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201606-09"
          },
          {
            "name": "VU#772447",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/772447"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://security.stackexchange.com/questions/110644"
        },
        {
          "name": "openSUSE-SU-2016:0243",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html"
        },
        {
          "name": "1034932",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034932"
        },
        {
          "name": "GLSA-201705-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201705-08"
        },
        {
          "name": "80501",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/80501"
        },
        {
          "name": "USN-2944-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2944-1"
        },
        {
          "name": "[oss-security] 20160114 Re: Fwd: FFmpeg: stealing local files with HLS+concat",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/14/1"
        },
        {
          "name": "SSA:2016-034-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.529036"
        },
        {
          "name": "DSA-3506",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3506"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://habrahabr.ru/company/mailru/blog/274855"
        },
        {
          "name": "GLSA-201606-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201606-09"
        },
        {
          "name": "VU#772447",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/772447"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-1897",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://security.stackexchange.com/questions/110644",
              "refsource": "MISC",
              "url": "http://security.stackexchange.com/questions/110644"
            },
            {
              "name": "openSUSE-SU-2016:0243",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html"
            },
            {
              "name": "1034932",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034932"
            },
            {
              "name": "GLSA-201705-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201705-08"
            },
            {
              "name": "80501",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/80501"
            },
            {
              "name": "USN-2944-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2944-1"
            },
            {
              "name": "[oss-security] 20160114 Re: Fwd: FFmpeg: stealing local files with HLS+concat",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/14/1"
            },
            {
              "name": "SSA:2016-034-02",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.529036"
            },
            {
              "name": "DSA-3506",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3506"
            },
            {
              "name": "http://habrahabr.ru/company/mailru/blog/274855",
              "refsource": "MISC",
              "url": "http://habrahabr.ru/company/mailru/blog/274855"
            },
            {
              "name": "GLSA-201606-09",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201606-09"
            },
            {
              "name": "VU#772447",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/772447"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-1897",
    "datePublished": "2016-01-15T02:00:00",
    "dateReserved": "2016-01-14T00:00:00",
    "dateUpdated": "2024-08-05T23:10:39.912Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-1897\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-01-15T03:59:23.063\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.\"},{\"lang\":\"es\",\"value\":\"FFmpeg 2.x permite a atacantes remotos llevar a cabo ataques de origen cruzado y leer archivos arbitrarios usando el protocolo concat en un archivo HTTP Live Streaming (HLS) M3U8, dando lugar a una petici\u00f3n HTTP externa en la que la cadena URL contiene la primera l\u00ednea de un archivo local.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1337F5B-E9D9-4335-9E05-50018E59E530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B27C609-E4B4-41CD-B228-38267AA3A8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97DBEE2-AF4E-4C2D-A185-F2A1B965D9DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEDAA24-D9E0-4384-B193-0C8814E4FDD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B0C71E-341A-434A-90AE-326097AC85E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E83D73FF-E6F6-4399-B721-6C6275C52B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07481C8-7CEB-4B81-B8E0-FF45DAA28870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E69881-F5C7-4BB3-8BEB-C3C85CCD4B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70C00A9-3562-45AB-B494-3BA91B6AFC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30389D2-2873-4F15-B249-066B6D37AC23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0487928D-6630-4E23-BBA5-BED0A0F156B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3088131-C48D-463B-8709-78A90EDE1FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADF01E6-CB58-4593-B444-A59232EE83CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06442F70-22B4-49E5-B25B-92E03973B57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E8FDCEA-336D-4BC9-AE93-9A0CCE443AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5505E58-DF70-4408-A347-FBB74D119566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D406D9D-A51A-4EE6-88BF-279422A4DBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B08A7BE-7C98-4659-808F-86A8EB4676D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF38DD1-2604-41AD-975A-56CC24767799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76392F6-6992-4B67-97BA-607A091DDA6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB396E84-FE69-4E19-9937-B82A63D347AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9CF7C7-3730-43EC-B63E-B004D979E57A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"889B2130-CB88-487B-92FB-959DB44B8E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9BE4879-972C-45EA-8253-46E5BE98FFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653411BA-9F0B-4BFC-8A42-6576E956F96D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"268DAF2F-4484-4212-AEB0-F9A10596F874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD7A424-DA4D-4508-B4EB-14A1BA65E596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C190A7C8-2DAE-4F72-A620-9D184CBF10B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E8764DC-1C01-4C3E-A7AC-C8AF69F944E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A45FBF-A89E-4F1C-B397-AB2A53DB805C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B3B781-7DEC-475C-A429-11D1B2F69CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FDCCDDC-6CDA-4D3B-BB4C-C370C69EB1C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63209CD1-2710-462C-9AEC-A9DE2B41A7B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336CB8D4-EBE0-4E34-9F71-DD0FEA8A99C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207DF654-326E-43A9-A5EC-BC239BF30422\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8794F8C5-A639-4C89-8C51-87787B29833F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B50AB2A-FA23-4BB0-AA21-724E770ADEFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BC4C82-371C-4B80-A615-AE0F15F1D6CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0E114D7-1323-4965-9680-8638ACDFF20B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BBF39F-668E-4771-99A0-F008B18B03F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC929DD-566D-4906-8960-7BCFA7EE0384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E41754-D2AB-4DE1-9ED9-A88F5E28ABFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D1738D-D85A-4650-9DAB-C626E7F52812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91B8DD5-FB80-47E7-8AF3-57D72CD4D034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ADB969-FA62-4238-83DF-D5703603A9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D51D915-0FAF-449F-825B-1F2B1F9BAF00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19772D67-FAE5-4178-815D-4F511AE0411E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6097F4-A8D1-4070-A4B2-8479421C15DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBBBB2E-F454-44F7-8131-BFF852BC6DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE75C995-BCB6-4F46-AE8C-B86FBF2702E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291E07BD-70C0-403B-ACB3-B49D2DED59C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA5BAC2-C23B-4D4E-8CA1-57780761AC35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AE997C-54E3-4619-A269-E96E79164C0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D13C0AC-8AB4-49E1-8A5C-98DCA6F01D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F19A0139-AF47-434F-AFE9-ECC003675537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF38E5B7-AB89-418E-B507-3D660FE753C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5249D4A-D8D9-4B89-96B6-E957A2210750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29619AAD-6792-4B38-8DFB-706BEACA46F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FEC8E4-6B53-459E-B257-BEE424463592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0A20D5-EAFD-4B79-818A-B834E9A11C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"045AD46C-4D1E-42C9-9CFB-7924B58AE55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A56E5B7-2C52-49F0-8EB1-8A090ACBF1FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B412DEE-9257-4588-83F2-F8DAC3F7E1DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35121E51-84B8-4725-B027-AE381CA1C9F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDCDF3E1-280C-4539-80F8-3B131461FDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE52F27-7AEC-40AB-9349-4C3E0E4743BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01917E14-8DB6-43FE-A7B9-02C87308F09B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3C37FF-6B21-409F-AC19-6C2F2F429109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EE84614-E84C-496D-933C-5BEFD385451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F6842E-041C-4076-8A2F-170DB783CC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B53136-92CB-45D4-8CA8-589D332AEBDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4876E244-8F7F-4EF2-B7D9-5146BCF02F59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3F7BF7-D609-44B1-9536-4A07DC149824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD5E478-1654-4A75-904D-8453DDC680A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3C0E7A-533F-4AD7-BD0C-B91C0139790A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150B1880-BFC3-42C4-B6A3-B96C67CD671D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA8F265-CE4D-46FE-9871-FDD4D6738DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"756A3888-E151-4FEA-8D14-F45F3192BCBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3F5FAA-AD9E-4FC1-B91C-E9A561E95173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A269C0-FE0F-4178-8195-955D373D9055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCA6A474-DA24-4510-8AAA-5DF2E85B4D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:2.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D124F06-CF7E-4549-82EC-D0EC0B73D146\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"}]}]}],\"references\":[{\"url\":\"http://habrahabr.ru/company/mailru/blog/274855\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.stackexchange.com/questions/110644\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3506\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/14/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/80501\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1034932\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.529036\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2944-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201606-09\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201705-08\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/772447\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://habrahabr.ru/company/mailru/blog/274855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.stackexchange.com/questions/110644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/14/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/80501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.529036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2944-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201606-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201705-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/772447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…