{"id":"CVE-2017-14170","details":"In libavformat/mxfdec.c in FFmpeg 3.3.3 -\u003e 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large \"nb_index_entries\" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file.","modified":"2026-04-16T01:39:41.027230289Z","published":"2017-09-07T06:29:00.267Z","related":["openSUSE-SU-2024:10754-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/100700"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3996"},{"type":"ADVISORY","url":"https://github.com/FFmpeg/FFmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2"},{"type":"REPORT","url":"https://github.com/FFmpeg/FFmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2"},{"type":"FIX","url":"https://github.com/FFmpeg/FFmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2"},{"type":"FIX","url":"https://github.com/FFmpeg/FFmpeg/commit/f173cdfe669556aa92857adafe60cbe5f2aa1210"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ffmpeg/ffmpeg","events":[{"introduced":"0"},{"fixed":"900f39692ca0337a98a7cf047e4e2611071810c2"},{"introduced":"0"},{"fixed":"f173cdfe669556aa92857adafe60cbe5f2aa1210"}]}],"versions":["N","n0.11-dev","n0.12-dev","n0.8","n1.1-dev","n1.2-dev","n1.3-dev","n2.0","n2.1-dev","n2.2-dev","n2.3-dev","n2.4","n2.4-dev","n2.4.1","n2.4.10","n2.4.11","n2.4.12","n2.4.13","n2.4.2","n2.4.3","n2.4.4","n2.4.5","n2.4.6","n2.4.7","n2.4.8","n2.4.9","n2.5-dev","n2.6-dev","n2.7-dev","n2.8-dev","n2.9-dev","n3.1-dev","n3.2-dev","n3.3-dev","n3.4-dev"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","signature_type":"Function","id":"CVE-2017-14170-402f6c8d","digest":{"function_hash":"7350275477220121909179389923599280712","length":859},"target":{"file":"libavformat/mxfdec.c","function":"mxf_read_index_entry_array"},"source":"https://github.com/ffmpeg/ffmpeg/commit/f173cdfe669556aa92857adafe60cbe5f2aa1210","deprecated":false},{"signature_version":"v1","signature_type":"Function","id":"CVE-2017-14170-6acf6e83","digest":{"function_hash":"156836032280374510452835169681765921076","length":952},"target":{"file":"libavformat/mxfdec.c","function":"mxf_read_index_entry_array"},"source":"https://github.com/ffmpeg/ffmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2","deprecated":false},{"signature_version":"v1","signature_type":"Line","id":"CVE-2017-14170-84f8077f","source":"https://github.com/ffmpeg/ffmpeg/commit/f173cdfe669556aa92857adafe60cbe5f2aa1210","digest":{"line_hashes":["306447737840415232004597201826736368124","126996753266323376184933011454295211259","255825946303932223054138375241430705080","302315235321539513036531029877255123150","101333621089334800209449894233315020167","24011609171819150529542193019128301368","164457422022711662989096906510131072276","230785548486680002557736998808488608342"],"threshold":0.9},"target":{"file":"libavformat/mxfdec.c"},"deprecated":false},{"signature_version":"v1","signature_type":"Line","id":"CVE-2017-14170-effeca0e","target":{"file":"libavformat/mxfdec.c"},"digest":{"line_hashes":["306447737840415232004597201826736368124","126996753266323376184933011454295211259","255825946303932223054138375241430705080","6987597824515003265516096991385634914","232128033444275761819789608406448936451","63962582659685061407823855668702644844","147794275574851851876074214455005715057","230785548486680002557736998808488608342"],"threshold":0.9},"source":"https://github.com/ffmpeg/ffmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2","deprecated":false}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-14170.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}