Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-83wf-4cch-p26q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

EPSS

Процентиль: 79%
0.01199
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

nvd
около 12 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.

debian
около 12 лет назад

The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before ...

EPSS

Процентиль: 79%
0.01199
Низкий