Date published: 2017-08-31T11:29:00.483-04:00
Date last modified: 2017-11-03T21:29:35.350-04:00
CVSS Score: 7.1
Principal attack vector: NETWORK
Reference URL: http://www.debian.org/security/2017/dsa-3996
Summary: In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large “duration” field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.