Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-7272

Опубликовано: 12 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 6.3

Описание

A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.

РелизСтатусПримечание
devel

not-affected

7:6.1.1-3ubuntu5
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

7:6.0-6ubuntu1
esm-apps/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

not-affected

7:6.0-6ubuntu1
oracular

not-affected

7:6.1.1-3ubuntu5

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

trusty/esm

not-affected

code not present
upstream

needs-triage

Показывать по

EPSS

Процентиль: 43%
0.00204
Низкий

7.5 High

CVSS2

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
nvd
больше 1 года назад

A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.

CVSS3: 6.3
debian
больше 1 года назад

A vulnerability, which was classified as critical, was found in FFmpeg ...

CVSS3: 6.3
github
больше 1 года назад

A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость функции fill_audiodata файла /libswresample/swresample.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 43%
0.00204
Низкий

7.5 High

CVSS2

6.3 Medium

CVSS3