Overview
ffmpeg is a "cross-platform solution to record, convert and stream audio and video". ffmpeg is vulnerable to local file disclosure due to improper enforcement of domain restrictions when processing playlist files.
Description
| CWE-201: Information Exposure Through Sent Data - CVE-2016-1897, CVE-2016-1898 When a user opens a maliciously crafted playlist file in ffmpeg, ffmpeg will query a server for remote data. By carefully crafting the playlist, an attacker can cause ffmpeg to request internet URIs that expose file:// content from the victim's machine. CVE-2016-1897 refers to an issue with processing playlists that use concatenations, while CVE-2016-1898 refers to a related issue with subfiles. | 
Impact
| By causing a specially-crafted playlist file to be processed with ffmpeg or Libav, a remote attacker may acquire file contents from a vulnerable system. In some circumstances, this may occur without explicit user interaction (such as the creation of a thumbnail preview by a file manager). | 
Solution
| Apply an update | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N | 
| Temporal | 3.9 | E:POC/RL:OF/RC:C | 
| Environmental | 2.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
This vulnerability was publicly disclosed by Maxim Andreev.
This document was written by Garret Wassermann and Will Dormann.
Other Information
| CVE IDs: | CVE-2016-1897, CVE-2016-1898 | 
| Date Public: | 2016-01-12 | 
| Date First Published: | 2016-01-20 | 
| Date Last Updated: | 2016-03-10 22:02 UTC | 
| Document Revision: | 49 |