{"id":"CVE-2016-6164","details":"Integer overflow in the mov_build_index function in libavformat/mov.c in FFmpeg before 2.8.8, 3.0.x before 3.0.3 and 3.1.x before 3.1.1 allows remote attackers to have unspecified impact via vectors involving sample size.","modified":"2026-03-14T09:21:36.454475Z","published":"2017-01-23T21:59:01.923Z","related":["MGASA-2018-0008"],"references":[{"type":"WEB","url":"http://git.videolan.org/gitweb.cgi/ffmpeg.git/?a=commit%3Bh=8a3221cc67a516dfc1700bdae3566ec52c7ee823"},{"type":"WEB","url":"http://www.securityfocus.com/bid/95862"},{"type":"ADVISORY","url":"https://www.ffmpeg.org/security.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ffmpeg/ffmpeg","events":[{"introduced":"0"},{"last_affected":"da4ea971617351600f49437bc9d489e650b4de38"},{"introduced":"0"},{"last_affected":"c40983a6f631d22fede713d535bb9c31d5c9740c"},{"introduced":"0"},{"last_affected":"fda00aa7749326f02a6ca0a7d9bd9bcda1054071"},{"introduced":"0"},{"last_affected":"c66f4d1ae64dffaf456d05cbdade02054446f499"},{"introduced":"0"},{"last_affected":"fbc96c50d72f55131e43939e38c1e5af4315a755"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.8.7"},{"introduced":"0"},{"last_affected":"3.0"},{"introduced":"0"},{"last_affected":"3.0.1"},{"introduced":"0"},{"last_affected":"3.0.2"},{"introduced":"0"},{"last_affected":"3.1"}]}}],"versions":["N","n0.11-dev","n0.12-dev","n0.8","n1.1-dev","n1.2-dev","n1.3-dev","n2.0","n2.1-dev","n2.2-dev","n2.3-dev","n2.4-dev","n2.5-dev","n2.6-dev","n2.7-dev","n2.8","n2.8-dev","n2.8.1","n2.8.2","n2.8.3","n2.8.4","n2.8.5","n2.8.6","n2.8.7","n2.9-dev","n3.0","n3.1-dev"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6164.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}