{"id":"CVE-2009-4632","details":"oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain pointer arithmetic, which might allow remote attackers to obtain sensitive memory contents and cause a denial of service via a crafted file that triggers an out-of-bounds read.","modified":"2026-04-10T03:41:02.636235Z","published":"2010-02-10T02:30:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/36805"},{"type":"ADVISORY","url":"http://secunia.com/advisories/38643"},{"type":"ADVISORY","url":"http://secunia.com/advisories/39482"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-2000"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:060"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:061"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:088"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:112"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:114"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-931-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0935"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/1241"},{"type":"EVIDENCE","url":"http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/36465"},{"type":"WEB","url":"https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240"}],"schema_version":"1.7.5"}