Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1816

Опубликовано: 02 мар. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ffmpegfixed7:7.1.1-1package
ffmpegnot-affectedbookwormpackage
ffmpegnot-affectedbullseyepackage

Примечания

  • Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/0526535cd58444dd264e810b2f3348b4d96cff3b

  • Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/b06845c6727a7c4391a7d5f607ae078aa0073c43 (n7.1.1)

  • https://trac.ffmpeg.org/ticket/11475

EPSS

Процентиль: 48%
0.00245
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 1 года назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
nvd
около 1 года назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
github
около 1 года назад

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
fstec
около 1 года назад

Уязвимость функции audio_element_obu() библиотеки libavformat мультимедийной среды Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
5 месяцев назад

Множественные уязвимости ffmpeg

EPSS

Процентиль: 48%
0.00245
Низкий