Summary
Detail | |||
---|---|---|---|
Vendor | Ffmpeg | First view | 2014-11-05 |
Product | Ffmpeg | Last view | 2025-02-23 |
Version | 2.2.9 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:ffmpeg:ffmpeg |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2025-02-23 | CVE-2025-1594 | A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
5.5 | 2025-02-17 | CVE-2025-1373 | A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue. |
7.5 | 2024-12-31 | CVE-2023-6603 | A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization. |
5.3 | 2024-12-31 | CVE-2023-6602 | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists. |
0 | 2024-11-29 | CVE-2024-36617 | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder. |
8.8 | 2024-08-12 | CVE-2024-7272 | A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component. |
8.8 | 2024-08-06 | CVE-2024-7055 | A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651. |
0 | 2024-04-19 | CVE-2023-50010 | FFmpeg v.n6.1-3-g466799d4f5 allows a buffer over-read at ff_gradfun_blur_line_movdqa_sse2, as demonstrated by a call to the set_encoder_id function in /fftools/ffmpeg_enc.c component. |
0 | 2024-04-19 | CVE-2023-50009 | FFmpeg v.n6.1-3-g466799d4f5 allows a heap-based buffer overflow via the ff_gaussian_blur_8 function in libavfilter/edge_template.c:116:5 component. |
0 | 2024-04-19 | CVE-2023-50008 | FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component. |
0 | 2024-04-19 | CVE-2023-50007 | FFmpeg v.n6.1-3-g466799d4f5 allows an attacker to trigger use of a parameter of negative size in the av_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component. |
0 | 2024-04-19 | CVE-2023-49502 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. |
0 | 2024-04-17 | CVE-2024-31585 | FFmpeg version n5.1 to n6.1 was discovered to contain an Off-by-one Error vulnerability in libavfilter/avf_showspectrum.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
0 | 2024-04-17 | CVE-2024-31582 | FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. |
0 | 2024-04-17 | CVE-2024-31578 | FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. |
9.8 | 2024-01-27 | CVE-2024-22862 | Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the JJPEG XL Parser. |
7.5 | 2024-01-27 | CVE-2024-22861 | Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module. |
9.8 | 2024-01-27 | CVE-2024-22860 | Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder. |
7.8 | 2023-11-16 | CVE-2023-47470 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps.c |
5.5 | 2023-10-27 | CVE-2023-46407 | FFmpeg prior to commit bf814 was discovered to contain an out of bounds read via the dist->alphabet_size variable in the read_vlc_prefix() function. |
8.1 | 2023-03-29 | CVE-2022-48434 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used). |
5.3 | 2023-01-12 | CVE-2022-3341 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash. |
7.5 | 2022-12-16 | CVE-2022-3109 | An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability. |
8.1 | 2022-11-13 | CVE-2022-3965 | A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544. |
8.1 | 2022-11-13 | CVE-2022-3964 | A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
26% (30) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
14% (16) | CWE-125 | Out-of-bounds Read |
10% (12) | CWE-787 | Out-of-bounds Write |
10% (12) | CWE-20 | Improper Input Validation |
6% (7) | CWE-476 | NULL Pointer Dereference |
5% (6) | CWE-190 | Integer Overflow or Wraparound |
5% (6) | CWE-189 | Numeric Errors |
3% (4) | CWE-200 | Information Exposure |
3% (4) | CWE-17 | Code |
2% (3) | CWE-399 | Resource Management Errors |
1% (2) | CWE-617 | Reachable Assertion |
1% (2) | CWE-416 | Use After Free |
1% (2) | CWE-99 | Improper Control of Resource Identifiers ('Resource Injection') |
0% (1) | CWE-415 | Double Free |
0% (1) | CWE-404 | Improper Resource Shutdown or Release |
0% (1) | CWE-369 | Divide By Zero |
0% (1) | CWE-362 | Race Condition |
0% (1) | CWE-252 | Unchecked Return Value |
0% (1) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
0% (1) | CWE-121 | Stack-based Buffer Overflow |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-08 | Name: The remote Debian host is missing a security update. File: debian_DLA-1630.nasl - Type: ACT_GATHER_INFO |
2018-12-21 | Name: The remote Debian host is missing a security update. File: debian_DLA-1611.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-19.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_5ccbb2f8c79811e7a633009c02a2ab30.nasl - Type: ACT_GATHER_INFO |
2018-07-18 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4249.nasl - Type: ACT_GATHER_INFO |
2017-11-28 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4049.nasl - Type: ACT_GATHER_INFO |
2017-11-01 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4012.nasl - Type: ACT_GATHER_INFO |
2017-10-23 | Name: The remote Debian host is missing a security update. File: debian_DLA-1142.nasl - Type: ACT_GATHER_INFO |
2017-10-16 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ed73829daf6d11e7a633009c02a2ab30.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3996.nasl - Type: ACT_GATHER_INFO |
2017-09-18 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1068.nasl - Type: ACT_GATHER_INFO |
2017-09-18 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1067.nasl - Type: ACT_GATHER_INFO |
2017-08-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3957.nasl - Type: ACT_GATHER_INFO |
2017-05-30 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-631.nasl - Type: ACT_GATHER_INFO |
2017-05-10 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201705-08.nasl - Type: ACT_GATHER_INFO |
2017-04-28 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-524.nasl - Type: ACT_GATHER_INFO |
2017-04-10 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-449.nasl - Type: ACT_GATHER_INFO |
2017-01-30 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201701-71.nasl - Type: ACT_GATHER_INFO |
2016-10-19 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-1203.nasl - Type: ACT_GATHER_INFO |
2016-10-05 | Name: The remote Debian host is missing a security update. File: debian_DLA-644.nasl - Type: ACT_GATHER_INFO |
2016-06-20 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201606-09.nasl - Type: ACT_GATHER_INFO |
2016-04-05 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2944-1.nasl - Type: ACT_GATHER_INFO |
2016-03-14 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201603-09.nasl - Type: ACT_GATHER_INFO |
2016-03-14 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201603-06.nasl - Type: ACT_GATHER_INFO |
2016-03-07 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3506.nasl - Type: ACT_GATHER_INFO |