{"id":"CVE-2017-5024","details":"FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.","modified":"2026-04-16T06:21:56.555336677Z","published":"2017-02-17T07:59:00.763Z","related":["openSUSE-SU-2017:0565-1","openSUSE-SU-2017:1531-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/95792"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037718"},{"type":"WEB","url":"https://crbug.com/643951"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0206.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3776"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-66"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-05"},{"type":"ARTICLE","url":"https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5024.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"55.0.2883.87"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}