SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   FFmpeg Vendors:   ffmpeg.sourceforge.net
(Ubuntu Issues Fix) FFmpeg Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System
SecurityTracker Alert ID:  1035463
SecurityTracker URL:  http://securitytracker.com/id/1035463
CVE Reference:   CVE-2016-1897, CVE-2016-1898   (Links to External Site)
Date:  Apr 4 2016
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.x
Description:   Two vulnerabilities were reported in FFmpeg. A remote user can bypass cross-orgin restrictions to obtain potentially sensitive information on the target system.

A remote user can create a specially crafted HTTP Live Streaming (HLS) M3U8 file that, when loaded by the target user, will concatenate the first line of a file on the target user's system to a URL and then request the URL [CVE-2016-1897].

A remote user can create a specially crafted HTTP Live Streaming (HLS) M3U8 file that, when loaded by the target user, will include an arbitrary line of a file on the target user's system in a URL and then request the URL [CVE-2016-1898].

Impact:   A remote user can view portions of files on the target user's system.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-2944-1

Vendor URL:  www.ubuntu.com/usn/usn-2944-1 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  12.04 LTS

Message History:   This archive entry is a follow-up to the message listed below.
Feb 4 2016 FFmpeg Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC