Description
Stack-based buffer overflow in the aac_sync function in aac_parser.c in Libav before 11.5 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
References (4)
Core 4
Core References
Various Sources x_refsource_confirm
https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=fb1473080223a634b8ac2cca48a632d037a0a69d
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/09/10/5
Patch, Third Party Advisory, VDB Entry x_refsource_misc
https://blogs.gentoo.org/ago/2016/08/20/libav-stack-based-buffer-overflow-in-aac_sync-aac_parser-c/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/92902
Scores
CVSS v3
5.5
EPSS
0.0028
EPSS Percentile
51.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (1)
libav/libav
< 11.4
Published
Feb 15, 2017
Tracked Since
Feb 18, 2026