Pardus:ffmpeg


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Pardus:ffmpeg
# 1  
Old 12-18-2008
Pardus:ffmpeg

LinuxSecurity.com: Two vulnerabilities have been fixed in ffmpeg which can cause to a DoS (Denial of Service). An endless loop vulnerability when opening corrupt FLV files. And divided by zero vulnerability in sub_packet_size.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

To call ffmpeg in a loop

Hello, I was inquiring myself if it's possible to call ffmpeg in loop, an in each iteration, ffmpeg will pick one of the files in a directory and produce a new with a slightest different name. Can be as simple as a '*' in the beginning of the file name. I know how to use ffmpeg to do the... (2 Replies)
Discussion started by: colt
2 Replies

2. Windows & DOS: Issues & Discussions

Ffmpeg

Hello everyone, I am new here so forgive me if this is in the wrong place. I am new to shell script and am trying to write a script to use with a program called ffmpeg. Would this be something I could get help with here? set /p VIDEO=Enter full name of video file on desktop: md... (7 Replies)
Discussion started by: junorich
7 Replies

3. UNIX and Linux Applications

Slideshow with ffmpeg converter

Hi, everyone! I'm on a Debian 9.0 GNU/Linux machine. I'm not a very experienced user, but I do my best to learn. So, I have a bunch of images PNG files. I'm trying to make a slideshow with these using the ffmpeg video converter. I also have an audio WAVE stereo file which I'd like to merge... (0 Replies)
Discussion started by: worov
0 Replies

4. Windows & DOS: Issues & Discussions

FFMPEG command problem...

Hi, Currently having some trouble with FFMPEG.... I have the following files: 0001_.gif 0002_.gif ............. 0584_.gif 0585_.gif 0586_.gif 0587_.gif 0588_.gif 0589_.gif 0590_.gif 0591_.gif And am trying to use ffmpeg to join them to a video as follows: (7 Replies)
Discussion started by: pasc
7 Replies

5. Shell Programming and Scripting

a playlist for ffmpeg streamer

Hi, I hope I am posting in the right place. I use to stream to justin tv using ffmpeg with that command ffmpeg -re -i "path/to/input.avi" -vcodec libx264 -preset fast -crf 30 -acodec libfaac -ab 128k -ar 44100 -f flv rtmp://live.justin.tv/app/xxxxxxxxxxx I would like to know if a bash... (2 Replies)
Discussion started by: undercash
2 Replies

6. Shell Programming and Scripting

FFMPEG in linux box

Hi all, I have successfully used ffmpeg.exe in windows. But i dont know how to use it in linux:confused:. When i tried running a java program in linux using ffmpeg, I am getting, the following error even after having that ffmpeg.exe in my classpath: "java.io.IOException: java.io.IOException:... (3 Replies)
Discussion started by: ananthi_ku
3 Replies

7. OS X (Apple)

Video grab using ffmpeg?

Does anyone know how to grab video (screen) on Terminal using ffmpeg (not X11). I have written a unix library and I'd like to make a short movie (demo) of it. Tried: I already own SNapz Pro2 but it hangs the system (I have an old Powerbook 15" PPC). I guess my system is too slow for version... (0 Replies)
Discussion started by: sentinel
0 Replies

8. UNIX for Dummies Questions & Answers

Completing ffmpeg installation

Hello. i am new to unix, though have quite a substantial background of other systems. i recently installed ffmpeg and mencoder on a unix server, which holds a website, in order to use these programs from the website. after installation, i can activate both commands directly using putty, no... (1 Reply)
Discussion started by: noamon
1 Replies
Login or Register to Ask a Question
RATS(1) 						      General Commands Manual							   RATS(1)

NAME
rats - Rough Auditing Tool for Security SYNOPSIS
rats [options] [file]... DESCRIPTION
rats is a rough auditing tool for security developed by Secure Software, Inc. It is a tool for scanning C, Perl, PHP, and Python source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race condi- tions. As its name implies, the tool performs only a rough analysis of source code. It will not find every error and will also find things that are not errors. Manual inspection of your code is still necessary, but greatly aided with this tool. When started, RATS will scan each file or each file in the directory specified on the command line and produce a report when scanning is complete. What vulnerabilities are reported in the final report depend on the data contained in the vulnerability database or databases that are used and the warning level in use. For each vulnerability, the list of files and line numbers where it occured is given, followed by a brief description of the vulnerability and suggested action. OPTIONS
-h, --help Displays a brief usage summary and exit. -a <fun> Report any occurence of function 'fun' in the source file(s) -d <filename>, --database <filename>, --db <filename> Specifies a vulnerability database to be loaded. You may have multiple -d options and each database specified will be loaded. -i, --input Causes a list of function calls that were used which accept external input to be produced at the end of the vulnerability report. -l <lang>, --language <language> Force the specified language to be used regardless of filename extension. Currently valid language names are "c", "perl", "php" and "python". -r, --references Causes references to vulnerable function calls that are not being used as calls themselves to be reported. -w <level>, --warning <level> Sets the warning level. Valid levels are 1, 2 or 3. 1 includes only default and high severity. 2 includes medium severity (default). 3 includes low severity vulnerabilities. -x Causes the default vulnerability databases (which are in the installation data directory, /usr/share/rats by default) to not be loaded. -R, --no-recurssion Do not recurse subdirectories when encountered. --xml Output in XML --html Output in HTML --follow-symlinks Follow symlinks and treat them like whatever they are pointing to. If the symlink points to a directory it will be descended into unless -R is specified, if a pointing to a file, it will be treated as a file. AUTHOR
This manual page was orginally written by Adam Lazur <adam@lazur.org>, for the Debian GNU/Linux system (but may be used by others). Modified by Secure Software, Inc. September 17, 2001 RATS(1)