Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1816

Опубликовано: 02 мар. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegfixed7:7.1.1-1package
ffmpegnot-affectedbookwormpackage
ffmpegnot-affectedbullseyepackage

Примечания

  • Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/0526535cd58444dd264e810b2f3348b4d96cff3b

  • Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/b06845c6727a7c4391a7d5f607ae078aa0073c43 (n7.1.1)

  • https://trac.ffmpeg.org/ticket/11475

EPSS

Процентиль: 41%
0.00192
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
9 месяцев назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
nvd
9 месяцев назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
github
9 месяцев назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
fstec
10 месяцев назад

Уязвимость функции audio_element_obu() библиотеки libavformat мультимедийной среды Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
21 день назад

Множественные уязвимости ffmpeg

EPSS

Процентиль: 41%
0.00192
Низкий