This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Ffmpeg First view 2014-11-05
Product Ffmpeg Last view 2025-02-23
Version 2.2.9 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:ffmpeg:ffmpeg

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2025-02-23 CVE-2025-1594

A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

5.5 2025-02-17 CVE-2025-1373

A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue.

7.5 2024-12-31 CVE-2023-6603

A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization.

5.3 2024-12-31 CVE-2023-6602

A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists.

0 2024-11-29 CVE-2024-36617

FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.

8.8 2024-08-12 CVE-2024-7272

A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.

8.8 2024-08-06 CVE-2024-7055

A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651.

0 2024-04-19 CVE-2023-50010

FFmpeg v.n6.1-3-g466799d4f5 allows a buffer over-read at ff_gradfun_blur_line_movdqa_sse2, as demonstrated by a call to the set_encoder_id function in /fftools/ffmpeg_enc.c component.

0 2024-04-19 CVE-2023-50009

FFmpeg v.n6.1-3-g466799d4f5 allows a heap-based buffer overflow via the ff_gaussian_blur_8 function in libavfilter/edge_template.c:116:5 component.

0 2024-04-19 CVE-2023-50008

FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component.

0 2024-04-19 CVE-2023-50007

FFmpeg v.n6.1-3-g466799d4f5 allows an attacker to trigger use of a parameter of negative size in the av_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component.

0 2024-04-19 CVE-2023-49502

Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component.

0 2024-04-17 CVE-2024-31585

FFmpeg version n5.1 to n6.1 was discovered to contain an Off-by-one Error vulnerability in libavfilter/avf_showspectrum.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

0 2024-04-17 CVE-2024-31582

FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input.

0 2024-04-17 CVE-2024-31578

FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function.

9.8 2024-01-27 CVE-2024-22862

Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the JJPEG XL Parser.

7.5 2024-01-27 CVE-2024-22861

Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module.

9.8 2024-01-27 CVE-2024-22860

Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder.

7.8 2023-11-16 CVE-2023-47470

Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps.c

5.5 2023-10-27 CVE-2023-46407

FFmpeg prior to commit bf814 was discovered to contain an out of bounds read via the dist->alphabet_size variable in the read_vlc_prefix() function.

8.1 2023-03-29 CVE-2022-48434

libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).

5.3 2023-01-12 CVE-2022-3341

A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash.

7.5 2022-12-16 CVE-2022-3109

An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.

8.1 2022-11-13 CVE-2022-3965

A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.

8.1 2022-11-13 CVE-2022-3964

A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.

CWE : Common Weakness Enumeration

%idName
26% (30) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
14% (16) CWE-125 Out-of-bounds Read
10% (12) CWE-787 Out-of-bounds Write
10% (12) CWE-20 Improper Input Validation
6% (7) CWE-476 NULL Pointer Dereference
5% (6) CWE-190 Integer Overflow or Wraparound
5% (6) CWE-189 Numeric Errors
3% (4) CWE-200 Information Exposure
3% (4) CWE-17 Code
2% (3) CWE-399 Resource Management Errors
1% (2) CWE-617 Reachable Assertion
1% (2) CWE-416 Use After Free
1% (2) CWE-99 Improper Control of Resource Identifiers ('Resource Injection')
0% (1) CWE-415 Double Free
0% (1) CWE-404 Improper Resource Shutdown or Release
0% (1) CWE-369 Divide By Zero
0% (1) CWE-362 Race Condition
0% (1) CWE-252 Unchecked Return Value
0% (1) CWE-191 Integer Underflow (Wrap or Wraparound)
0% (1) CWE-121 Stack-based Buffer Overflow

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-08 Name: The remote Debian host is missing a security update.
File: debian_DLA-1630.nasl - Type: ACT_GATHER_INFO
2018-12-21 Name: The remote Debian host is missing a security update.
File: debian_DLA-1611.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-19.nasl - Type: ACT_GATHER_INFO
2018-07-30 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_5ccbb2f8c79811e7a633009c02a2ab30.nasl - Type: ACT_GATHER_INFO
2018-07-18 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4249.nasl - Type: ACT_GATHER_INFO
2017-11-28 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4049.nasl - Type: ACT_GATHER_INFO
2017-11-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4012.nasl - Type: ACT_GATHER_INFO
2017-10-23 Name: The remote Debian host is missing a security update.
File: debian_DLA-1142.nasl - Type: ACT_GATHER_INFO
2017-10-16 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_ed73829daf6d11e7a633009c02a2ab30.nasl - Type: ACT_GATHER_INFO
2017-10-11 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3996.nasl - Type: ACT_GATHER_INFO
2017-09-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1068.nasl - Type: ACT_GATHER_INFO
2017-09-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1067.nasl - Type: ACT_GATHER_INFO
2017-08-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3957.nasl - Type: ACT_GATHER_INFO
2017-05-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-631.nasl - Type: ACT_GATHER_INFO
2017-05-10 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201705-08.nasl - Type: ACT_GATHER_INFO
2017-04-28 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-524.nasl - Type: ACT_GATHER_INFO
2017-04-10 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-449.nasl - Type: ACT_GATHER_INFO
2017-01-30 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-71.nasl - Type: ACT_GATHER_INFO
2016-10-19 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-1203.nasl - Type: ACT_GATHER_INFO
2016-10-05 Name: The remote Debian host is missing a security update.
File: debian_DLA-644.nasl - Type: ACT_GATHER_INFO
2016-06-20 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201606-09.nasl - Type: ACT_GATHER_INFO
2016-04-05 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2944-1.nasl - Type: ACT_GATHER_INFO
2016-03-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201603-09.nasl - Type: ACT_GATHER_INFO
2016-03-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201603-06.nasl - Type: ACT_GATHER_INFO
2016-03-07 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3506.nasl - Type: ACT_GATHER_INFO