Lucene search

K
ubuntuUbuntuUSN-6449-1
HistoryOct 24, 2023 - 12:00 a.m.

FFmpeg vulnerabilities

2023-10-2400:00:00
ubuntu.com
64
ubuntu
ffmpeg
memory leak
denial of service
integer overflow
cve-2020-22038
cve-2020-20898
cve-2021-38090
cve-2021-38091
cve-2021-38092
cve-2021-38093
cve-2021-38094
cve-2022-48434
multimedia files
streaming

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.4%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • ffmpeg - Tools for transcoding, streaming and playing of multimedia files

Details

It was discovered that FFmpeg incorrectly managed memory resulting
in a memory leak. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)

It was discovered that FFmpeg incorrectly handled certain input files,
leading to an integer overflow. An attacker could possibly use this issue
to cause a denial of service via application crash. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090,
CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)

It was discovered that FFmpeg incorrectly managed memory, resulting in
a memory leak. If a user or automated system were tricked into
processing a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2022-48434)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1+esm2UNKNOWN
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-doc< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-dev< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Rows per page:
1-10 of 1521

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.4%