Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-3157 (GCVE-0-2014-3157)
Vulnerability from cvelistv5 – Published: 2014-06-11 10:00 – Updated: 2024-08-06 10:35
VLAI?
EPSS
Summary
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:35:56.467Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"name": "67972",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/67972"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"name": "59090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59090"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"name": "GLSA-201408-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "60372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60372"
},
{
"name": "60061",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60061"
},
{
"name": "58585",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/58585"
},
{
"name": "DSA-2959",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2959"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-28T19:57:01.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"name": "67972",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/67972"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"name": "59090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59090"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"name": "GLSA-201408-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "60372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60372"
},
{
"name": "60061",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60061"
},
{
"name": "58585",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/58585"
},
{
"name": "DSA-2959",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2959"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-3157",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"name": "67972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67972"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=368980",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"name": "59090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59090"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "60372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60372"
},
{
"name": "60061",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60061"
},
{
"name": "58585",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58585"
},
{
"name": "DSA-2959",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2959"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2014-3157",
"datePublished": "2014-06-11T10:00:00.000Z",
"dateReserved": "2014-05-03T00:00:00.000Z",
"dateUpdated": "2024-08-06T10:35:56.467Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2014-AVI-268
Vulnerability from certfr_avis - Published: 2014-06-11 - Updated: 2014-06-11
De multiples vulnérabilités ont été corrigées dans Google Chrome. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Google Chrome 35.0.1916.153
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Google Chrome 35.0.1916.153\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3155",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3155"
},
{
"name": "CVE-2014-3154",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3154"
},
{
"name": "CVE-2014-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3156"
},
{
"name": "CVE-2014-3157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3157"
}
],
"initial_release_date": "2014-06-11T00:00:00",
"last_revision_date": "2014-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-268",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Chrome\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 10 juin 2014",
"url": "http://googlechromereleases.blogspot.fr/2014/06/stable-channel-update.html"
}
]
}
GHSA-XRPX-WQMR-PMXG
Vulnerability from github – Published: 2022-05-14 04:01 – Updated: 2022-05-14 04:01
VLAI?
Details
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
{
"affected": [],
"aliases": [
"CVE-2014-3157"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-06-11T10:57:00Z",
"severity": "HIGH"
},
"details": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.",
"id": "GHSA-xrpx-wqmr-pmxg",
"modified": "2022-05-14T04:01:58Z",
"published": "2022-05-14T04:01:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3157"
},
{
"type": "WEB",
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"type": "WEB",
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/58585"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/59090"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60061"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60372"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2959"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/67972"
}
],
"schema_version": "1.4.0",
"severity": []
}
CVE-2014-3157
Vulnerability from fstec - Published: 11.06.2014
VLAI Severity ?
Title
Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании
Description
Браузер Google Chrome содержит уязвимость, связанную с переполнением буфера в динамической памяти в функции FFmpegVideoDecoder::GetVideoBuffer в media/filters/ffmpeg_video_decoder.cc. Эксплуатация данной уязвимости позволяет злоумышленникам, действующим удаленно, вызвать отказ в обслуживании или оказать иное воздействие на систему при помощи структур данных VideoFrame, которые слишком малы для корректного взаимодействия с базовой библиотекой FFmpeg
Severity ?
Vendor
Google Inc
Software Name
Google Chrome
Software Version
от 35.0.1916.0 до 35.0.1916.152 включительно (Google Chrome)
Possible Mitigations
Обновление программного обеспечения до версии 35.0.1916.153или выше
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3157
CWE
CWE-119
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Google Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 35.0.1916.0 \u0434\u043e 35.0.1916.152 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Google Chrome)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 35.0.1916.153\u0438\u043b\u0438 \u0432\u044b\u0448\u0435",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.06.2014",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "28.11.2016",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.07.2016",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2014-00209",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2014-3157",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Google Chrome",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . 64-bit, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . 32-bit",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0411\u0440\u0430\u0443\u0437\u0435\u0440 Google Chrome \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 FFmpegVideoDecoder::GetVideoBuffer \u0432 media/filters/ffmpeg_video_decoder.cc. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0438\u043d\u043e\u0435 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440 \u0434\u0430\u043d\u043d\u044b\u0445 VideoFrame, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043b\u0438\u0448\u043a\u043e\u043c \u043c\u0430\u043b\u044b \u0434\u043b\u044f \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0433\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u043e\u0439 FFmpeg",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3157",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
GSD-2014-3157
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2014-3157",
"description": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.",
"id": "GSD-2014-3157",
"references": [
"https://www.suse.com/security/cve/CVE-2014-3157.html",
"https://www.debian.org/security/2014/dsa-2959",
"https://ubuntu.com/security/CVE-2014-3157"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-3157"
],
"details": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.",
"id": "GSD-2014-3157",
"modified": "2023-12-13T01:22:53.804515Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-3157",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"name": "67972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67972"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=368980",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"name": "59090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59090"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "60372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60372"
},
{
"name": "60061",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60061"
},
{
"name": "58585",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58585"
},
{
"name": "DSA-2959",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2959"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.140:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.138:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.122:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.121:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.114:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.149:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.127:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.126:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.125:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.118:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.117:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "35.0.1916.152",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.151:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.137:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.128:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.119:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.142:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.141:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.124:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.123:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.116:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.113:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2014-3157"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://code.google.com/p/chromium/issues/detail?id=368980",
"refsource": "CONFIRM",
"tags": [],
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"name": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision",
"refsource": "CONFIRM",
"tags": [],
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"name": "67972",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/67972"
},
{
"name": "59090",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/59090"
},
{
"name": "58585",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/58585"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "60372",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/60372"
},
{
"name": "60061",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/60061"
},
{
"name": "DSA-2959",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2014/dsa-2959"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-12-29T02:29Z",
"publishedDate": "2014-06-11T10:57Z"
}
}
}
FKIE_CVE-2014-3157
Vulnerability from fkie_nvd - Published: 2014-06-11 10:57 - Updated: 2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| chrome | 35.0.1916.0 | ||
| chrome | 35.0.1916.1 | ||
| chrome | 35.0.1916.2 | ||
| chrome | 35.0.1916.3 | ||
| chrome | 35.0.1916.4 | ||
| chrome | 35.0.1916.5 | ||
| chrome | 35.0.1916.6 | ||
| chrome | 35.0.1916.7 | ||
| chrome | 35.0.1916.8 | ||
| chrome | 35.0.1916.9 | ||
| chrome | 35.0.1916.10 | ||
| chrome | 35.0.1916.11 | ||
| chrome | 35.0.1916.13 | ||
| chrome | 35.0.1916.14 | ||
| chrome | 35.0.1916.15 | ||
| chrome | 35.0.1916.17 | ||
| chrome | 35.0.1916.18 | ||
| chrome | 35.0.1916.19 | ||
| chrome | 35.0.1916.20 | ||
| chrome | 35.0.1916.21 | ||
| chrome | 35.0.1916.22 | ||
| chrome | 35.0.1916.23 | ||
| chrome | 35.0.1916.27 | ||
| chrome | 35.0.1916.31 | ||
| chrome | 35.0.1916.32 | ||
| chrome | 35.0.1916.33 | ||
| chrome | 35.0.1916.34 | ||
| chrome | 35.0.1916.35 | ||
| chrome | 35.0.1916.36 | ||
| chrome | 35.0.1916.37 | ||
| chrome | 35.0.1916.38 | ||
| chrome | 35.0.1916.39 | ||
| chrome | 35.0.1916.40 | ||
| chrome | 35.0.1916.41 | ||
| chrome | 35.0.1916.42 | ||
| chrome | 35.0.1916.43 | ||
| chrome | 35.0.1916.44 | ||
| chrome | 35.0.1916.45 | ||
| chrome | 35.0.1916.46 | ||
| chrome | 35.0.1916.47 | ||
| chrome | 35.0.1916.48 | ||
| chrome | 35.0.1916.49 | ||
| chrome | 35.0.1916.51 | ||
| chrome | 35.0.1916.52 | ||
| chrome | 35.0.1916.54 | ||
| chrome | 35.0.1916.56 | ||
| chrome | 35.0.1916.57 | ||
| chrome | 35.0.1916.59 | ||
| chrome | 35.0.1916.61 | ||
| chrome | 35.0.1916.68 | ||
| chrome | 35.0.1916.69 | ||
| chrome | 35.0.1916.71 | ||
| chrome | 35.0.1916.72 | ||
| chrome | 35.0.1916.74 | ||
| chrome | 35.0.1916.77 | ||
| chrome | 35.0.1916.80 | ||
| chrome | 35.0.1916.82 | ||
| chrome | 35.0.1916.84 | ||
| chrome | 35.0.1916.85 | ||
| chrome | 35.0.1916.86 | ||
| chrome | 35.0.1916.88 | ||
| chrome | 35.0.1916.90 | ||
| chrome | 35.0.1916.92 | ||
| chrome | 35.0.1916.93 | ||
| chrome | 35.0.1916.95 | ||
| chrome | 35.0.1916.96 | ||
| chrome | 35.0.1916.98 | ||
| chrome | 35.0.1916.99 | ||
| chrome | 35.0.1916.101 | ||
| chrome | 35.0.1916.103 | ||
| chrome | 35.0.1916.104 | ||
| chrome | 35.0.1916.105 | ||
| chrome | 35.0.1916.106 | ||
| chrome | 35.0.1916.107 | ||
| chrome | 35.0.1916.108 | ||
| chrome | 35.0.1916.109 | ||
| chrome | 35.0.1916.110 | ||
| chrome | 35.0.1916.111 | ||
| chrome | 35.0.1916.112 | ||
| chrome | 35.0.1916.113 | ||
| chrome | 35.0.1916.114 | ||
| chrome | 35.0.1916.115 | ||
| chrome | 35.0.1916.116 | ||
| chrome | 35.0.1916.117 | ||
| chrome | 35.0.1916.118 | ||
| chrome | 35.0.1916.119 | ||
| chrome | 35.0.1916.120 | ||
| chrome | 35.0.1916.121 | ||
| chrome | 35.0.1916.122 | ||
| chrome | 35.0.1916.123 | ||
| chrome | 35.0.1916.124 | ||
| chrome | 35.0.1916.125 | ||
| chrome | 35.0.1916.126 | ||
| chrome | 35.0.1916.127 | ||
| chrome | 35.0.1916.128 | ||
| chrome | 35.0.1916.137 | ||
| chrome | 35.0.1916.138 | ||
| chrome | 35.0.1916.140 | ||
| chrome | 35.0.1916.141 | ||
| chrome | 35.0.1916.142 | ||
| chrome | 35.0.1916.149 | ||
| chrome | 35.0.1916.150 | ||
| chrome | 35.0.1916.151 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C009A030-EC4C-45E7-8D8B-62095FB581D6",
"versionEndIncluding": "35.0.1916.152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7A8B66A-B3CA-44D4-8840-E544D95C5C55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4626CE7E-1135-43BB-A999-D9E9645F4F26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
"matchCriteriaId": "15B6A451-EF11-47B4-84E7-3EF2554717BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5FCB33-E3B3-4CB5-8009-67EBAA2AF27A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
"matchCriteriaId": "825D51C2-BF0E-4A17-B07B-FBBE07FF3430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
"matchCriteriaId": "44AE8107-4530-48A9-BF3D-6CEEFFDE81DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
"matchCriteriaId": "94744496-D0BE-4FAC-B0DE-40E2EF7D2967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D18C1D47-733C-4B51-9A04-253D06D20528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6B4DAE-315E-4D49-A4E2-169AE8C659AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6E267532-0240-48B5-A8A7-D452DCE68545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B073B1B6-37FC-4481-A4A8-D859F9CAD0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
"matchCriteriaId": "249F1026-0BEE-44FC-BA08-B18A67EC2D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7BF63D-3561-4636-9D0F-5C029DE4FDE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
"matchCriteriaId": "65DCFD8D-42CD-4E88-9B66-10D30390A029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B78C9F-2431-4BED-AE00-C9C6F49D91BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
"matchCriteriaId": "6638F45A-3E2E-47A7-9E29-51BC80E821CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
"matchCriteriaId": "97C21673-D3BE-4549-ADBE-86A8C544ACED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
"matchCriteriaId": "905CE4CB-23CE-46B3-AF25-8300A348D330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
"matchCriteriaId": "63D7D729-94F9-406F-9AD7-FD4830234FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
"matchCriteriaId": "70B2C2C1-6D3C-416D-8BA2-8A1E8783260C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4E3A0D-5FFD-49BB-B0DC-D966D4FEE656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
"matchCriteriaId": "B09378C5-9960-4DBA-BADF-75F59A670949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5DCFC6-4E56-4C8C-884C-DF1CB3BC7259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
"matchCriteriaId": "0BEB034A-ED1A-4692-BC3D-EC87204A6092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D7DC0366-8512-4679-9C01-92B894CB1E65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
"matchCriteriaId": "42440388-7439-407F-A753-77B5E196E764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
"matchCriteriaId": "08529C78-3AEF-4A48-B57A-A3AFD220E717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
"matchCriteriaId": "E4418F2D-F462-4E9B-BD09-12D24726BBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6B7553-A96D-48BC-A555-DB94EB630AAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
"matchCriteriaId": "1B752A1B-08A6-4D76-9560-4B8287A43D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD5AB04-7B94-4B00-907A-499A19176509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF805B-852D-412D-8B90-A4166041A0F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
"matchCriteriaId": "741566D6-E3E0-43E6-8B12-19C1CD77C213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BBD82A-39A6-4CC9-94FE-E3E81E0C06FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
"matchCriteriaId": "F561EBB8-231D-481F-B109-CFEF3F010FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
"matchCriteriaId": "3495A795-48EA-4BE9-B6CF-DF934AE3EE1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
"matchCriteriaId": "4097E83B-5E58-4E70-B1B6-533B97C6405A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
"matchCriteriaId": "CF37D299-CB0F-4F94-BBFE-4C1C966A4AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
"matchCriteriaId": "9965D997-4F96-48BF-94CE-BA471ADE2A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDAB66F-038E-4955-81B7-A6E2157C0BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
"matchCriteriaId": "F095537D-5045-4450-BCBF-4C93E6E042F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
"matchCriteriaId": "710040CA-3DEF-484A-88FF-C44D17526B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8B5FDF-5ABE-4A17-B956-FE7CC3F3F1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5434C6FD-3C1C-4272-9D8F-5F7AB8E68046",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
"matchCriteriaId": "5F907549-BEA6-46C7-A528-7E97A8655595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
"matchCriteriaId": "C66DBB18-CA4B-439E-8D2E-8E5E6A42CF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
"matchCriteriaId": "7E24A976-B366-412C-8635-CD65687C3A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
"matchCriteriaId": "717CD257-B2A1-4DE6-83BA-6CE0F58B1B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
"matchCriteriaId": "66BE9002-9D3A-4D58-A032-1E35364FAFD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
"matchCriteriaId": "313D6BBA-A159-47DA-97E9-CE63AD1DEBF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
"matchCriteriaId": "0576D407-07F9-4163-8937-8D85974918A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
"matchCriteriaId": "72F45D58-425C-4ABB-ADD3-2BBADA74A19F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
"matchCriteriaId": "FC63BF1F-DB9F-4C4E-8460-40A801084020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B3D4FD-9707-4B18-96CE-D7CF7EA5F881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
"matchCriteriaId": "694FBD5C-32E7-4E99-9BDD-8CE8E5D45CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7E21C9-50F7-44A3-B642-4BFF4699EBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
"matchCriteriaId": "AE68628B-FEBF-4A75-99C6-C6FA76A5989E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
"matchCriteriaId": "6755C15D-08BD-47DA-B363-6F31F7DE5923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF01221-5CE0-4559-83E6-3273D573F0DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
"matchCriteriaId": "061A50AD-9D9F-44CA-867B-2E10B9282CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
"matchCriteriaId": "587440DE-F09E-4789-9B58-4FCDCBFA431E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F1FFDF-509C-4608-9538-EFF07A5031C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE0FDEC-2FDB-4902-9904-F2F9E2E6226E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
"matchCriteriaId": "05F34690-1EFA-49D3-91B7-E3BD0B3D7056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
"matchCriteriaId": "44578154-8DFF-4EC7-834C-B54FD6149B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
"matchCriteriaId": "D2C2D488-342C-4CAC-A07D-2C198465BC32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D63F62-CC1E-43CF-B1D6-192492796862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
"matchCriteriaId": "B5366995-F5FD-4F6E-BFB7-D1E61E52B9DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
"matchCriteriaId": "CF55EAB7-A108-4B80-A969-D07A2EDA6184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
"matchCriteriaId": "17E16492-4A75-474C-9DEA-B150763843B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
"matchCriteriaId": "E431FC69-6C1B-475D-B646-FFB2210C438B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA8FBB0-1004-40C2-AADD-4DE09CFE9326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
"matchCriteriaId": "CF6CF0AA-AEBE-48FD-A83B-D9ADC25C323F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
"matchCriteriaId": "1C6EC014-5EB1-4C19-B828-5DBA6A525194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
"matchCriteriaId": "8E90CAB9-09DE-462B-96E4-4FAEC5642F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3CF5D9-E8DE-4751-A873-A3A6769BC19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
"matchCriteriaId": "B86895A1-98A7-46C8-8E52-889CB34EEEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
"matchCriteriaId": "3E52314C-CB22-4702-8108-F855CEC349D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*",
"matchCriteriaId": "379EB1A9-61DB-4A31-8568-DFB5BA3EE610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.113:*:*:*:*:*:*:*",
"matchCriteriaId": "D7928F06-3F55-45DD-B44B-A52290C82010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.114:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A9804F-197F-48FE-92C1-520396BA5DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.115:*:*:*:*:*:*:*",
"matchCriteriaId": "96981161-6B2F-4FF5-BDB2-5FCE1A7678D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.116:*:*:*:*:*:*:*",
"matchCriteriaId": "94ADAE73-F15E-4ADA-BCE9-70DC8B3274FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.117:*:*:*:*:*:*:*",
"matchCriteriaId": "870AFE04-3F59-4382-82BB-5C4E3155C676",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.118:*:*:*:*:*:*:*",
"matchCriteriaId": "9532C171-D309-46D5-BBC4-05F72F9631F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.119:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE98B4E-E441-4D10-9D97-33446555B57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.120:*:*:*:*:*:*:*",
"matchCriteriaId": "E340351A-D2F9-4C54-9979-955D756897A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.121:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8E2CCB-AE87-4AB3-A21E-F7B112A0AB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.122:*:*:*:*:*:*:*",
"matchCriteriaId": "AF761823-1845-439D-93BD-FBE9E4092937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.123:*:*:*:*:*:*:*",
"matchCriteriaId": "C8FDDCD2-0FA5-4739-8114-479F3D3782ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.124:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAAD083-D803-489B-B00A-BFED5C4D0ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.125:*:*:*:*:*:*:*",
"matchCriteriaId": "B324C631-11C4-4377-AEC7-322285450A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.126:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5A6E8E-3C7F-443C-9EB8-91A75F72E81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.127:*:*:*:*:*:*:*",
"matchCriteriaId": "23DA4C1B-6D3D-4E7A-8D15-205B0C830684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.128:*:*:*:*:*:*:*",
"matchCriteriaId": "E88D324E-6C54-4ABF-92E7-448614200ED1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.137:*:*:*:*:*:*:*",
"matchCriteriaId": "1A19CF4F-8AD7-439F-A09E-878FDD3DE8E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.138:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7553FC-75E4-45B9-B9CD-A1C5B4261CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.140:*:*:*:*:*:*:*",
"matchCriteriaId": "2107501A-B96D-4743-AC9C-48BF51680997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.141:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD45C38-49DC-4AE1-A60E-1F42CD1038B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.142:*:*:*:*:*:*:*",
"matchCriteriaId": "75F8DA98-4D83-4E64-B059-A90B02C7E349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.149:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7619BC-7488-46C8-B6D3-FDCC931F92A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.150:*:*:*:*:*:*:*",
"matchCriteriaId": "820BDA34-994F-464B-A74D-9D1D73CC2A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:35.0.1916.151:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A9F2C-6B41-4C06-B3F8-E925FD99789E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n FFmpegVideoDecoder::GetVideoBuffer en media/filters/ffmpeg_video_decoder.cc en Google Chrome anterior a 35.0.1916.153 permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado mediante el aprovechamiento de estructuras de datos VideoFrame que son demasiado peque\u00f1as para la interacci\u00f3n debida con una librar\u00eda FFmpeg subyacente."
}
],
"id": "CVE-2014-3157",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-11T10:57:18.610",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://secunia.com/advisories/58585"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://secunia.com/advisories/59090"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://secunia.com/advisories/60061"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://secunia.com/advisories/60372"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.debian.org/security/2014/dsa-2959"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.securityfocus.com/bid/67972"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/58585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60061"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2959"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/67972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://code.google.com/p/chromium/issues/detail?id=368980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://src.chromium.org/viewvc/chrome?revision=268831\u0026view=revision"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…