First published: Mon May 24 2021(Updated: )
Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which could let a remote malicious user cause a Denial of Service
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg FFmpeg | =4.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/ffmpeg | 7:4.3.7-0+deb11u1 7:4.3.8-0+deb11u1 7:5.1.6-0+deb12u1 7:7.0.2-3 7:7.1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this buffer overflow vulnerability is CVE-2020-21041.
This vulnerability exists in FFmpeg version 4.1.
The root cause of this vulnerability is a buffer overflow in the apng_do_inverse_blend function in libavcodec/pngenc.c.
A remote malicious user can exploit this vulnerability to cause a Denial of Service (DoS) attack.
Yes, there are remedies available for this vulnerability. Please refer to the provided references for more information.