Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-3964

Опубликовано: 13 нояб. 2022
Источник: ubuntu
Приоритет: medium
CVSS3: 4.3

Описание

A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

needed

esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

released

7:4.4.2-0ubuntu0.22.04.1+esm1
esm-apps/noble

needed

esm-apps/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

needed

kinetic

released

7:5.1.1-1ubuntu2.1

Показывать по

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
около 3 лет назад

A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.

CVSS3: 4.3
debian
около 3 лет назад

A vulnerability classified as problematic has been found in ffmpeg. Th ...

suse-cvrf
около 3 лет назад

Security update for ffmpeg-4

CVSS3: 8.1
github
около 3 лет назад

A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.

CVSS3: 8.1
fstec
около 3 лет назад

Уязвимость компонента libavcodec/rpzaenc.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

4.3 Medium

CVSS3