FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow.
http://www.vupen.com/english/advisories/2011/1241
http://www.vupen.com/english/advisories/2010/0935
http://www.ubuntu.com/usn/USN-931-1
http://www.securityfocus.com/bid/36465
http://www.mandriva.com/security/advisories?name=MDVSA-2011:114
http://www.mandriva.com/security/advisories?name=MDVSA-2011:112
http://www.mandriva.com/security/advisories?name=MDVSA-2011:088
http://www.mandriva.com/security/advisories?name=MDVSA-2011:061
http://www.mandriva.com/security/advisories?name=MDVSA-2011:060
http://www.mandriva.com/security/advisories?name=MDVSA-2011:059
http://www.debian.org/security/2010/dsa-2000
http://secunia.com/advisories/39482
http://secunia.com/advisories/38643
http://secunia.com/advisories/36805
http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html