2017-10-16 12:31:07 -04:00
{
2019-03-18 03:10:42 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2016-10191" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 03:10:42 +00:00
"lang" : "eng" ,
"value" : "Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches."
2017-10-16 12:31:07 -04:00
}
2019-03-18 03:10:42 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "[debian-lts-announce] 20181220 [SECURITY] [DLA 1611-1] libav security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html"
} ,
{
"name" : "95989" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/95989"
} ,
{
"name" : "[oss-security] 20170201 CVE Request: ffmpeg remote exploitaion results code execution" ,
"refsource" : "MLIST" ,
"url" : "http://www.openwall.com/lists/oss-security/2017/01/31/12"
} ,
{
"name" : "[oss-security] 20170202 Re: CVE Request: ffmpeg remote exploitaion results code execution" ,
"refsource" : "MLIST" ,
"url" : "http://www.openwall.com/lists/oss-security/2017/02/02/1"
} ,
{
"name" : "https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7"
} ,
{
"name" : "https://ffmpeg.org/security.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://ffmpeg.org/security.html"
}
]
}
}