PatchSiren cyber security CVE debrief
CVE-2016-6164 Ffmpeg CVE debrief
CVE-2016-6164 is a critical FFmpeg issue in the MOV demuxing path. The flaw is an integer overflow in mov_build_index within libavformat/mov.c, reachable while processing sample size-related data in media files. NVD rates the issue as network-exploitable with no privileges or user interaction required, and assigns high confidentiality, integrity, and availability impact. Affected versions are identified as FFmpeg before 2.8.8, 3.0.x before 3.0.3, and 3.1.x before 3.1.1.
- Vendor
- Ffmpeg
- Product
- CVE-2016-6164
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Teams that ingest or transcode untrusted media with FFmpeg should care, especially services, desktop apps, media gateways, and embedded products that parse MOV/QuickTime content from external sources.
Technical summary
The vulnerability is a CWE-190 integer overflow in mov_build_index in FFmpeg's libavformat/mov.c. According to the CVE record, the issue is triggered through vectors involving sample size handling in MOV parsing. The published CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating remote exploitation is possible without authentication or user interaction. NVD lists affected FFmpeg releases through 2.8.7, 3.0.2 in the 3.0 branch, and 3.1.0 in the 3.1 branch, with the CVE description also naming fixed releases 2.8.8, 3.0.3, and 3.1.1.
Defensive priority
High. This is an internet-reachable media parsing flaw with critical CVSS severity and no required privileges or interaction. Prioritize any exposed service or application that accepts attacker-controlled MOV content.
Recommended defensive actions
- Update FFmpeg to a fixed release at or above 2.8.8, 3.0.3, or 3.1.1, depending on the branch in use.
- Inventory all applications, services, and embedded products that bundle or link against FFmpeg.
- Treat untrusted media as high risk and limit direct exposure of parsing pipelines to attacker-controlled files.
- Validate that vendor packages or downstream builds include the relevant FFmpeg security fix, not just the upstream version string.
- Use the official FFmpeg security advisory and the linked upstream commit to confirm patch status in your environment.
Evidence notes
Supported by the NVD CVE record and the FFmpeg vendor advisory link referenced in the source corpus. The CVE description names the vulnerable function and fixed versions; NVD classifies the weakness as CWE-190 and publishes the CVSS vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. No KEV entry is present in the supplied enrichment data.
Official resources
-
CVE-2016-6164 CVE record
CVE.org
-
CVE-2016-6164 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2017-01-23T21:59:01.923Z. NVD last modified the record on 2026-05-13T00:24:29.033Z. No KEV date was supplied.