First published: Thu May 27 2021(Updated: )
A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in convolution_y_8bit, which could let a remote malicious user cause a Denial of Service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.3.7-0+deb11u1 7:4.3.8-0+deb11u1 7:5.1.6-0+deb12u1 7:7.0.2-3 7:7.1-3 | |
FFmpeg | =4.2 | |
Debian Debian Linux | =10.0 |
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=82ad1b76751bcfad5005440db48c46a4de5d6f02
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-22033 is a heap-based buffer overflow vulnerability in FFmpeg 4.2 at libavfilter/vf_vmafmotion.c.
CVE-2020-22033 could allow a remote malicious user to cause a denial of service (DoS) on the system.
The affected software versions include FFmpeg 4.4.2-0ubuntu0.21.10.1, 3.4.11-0ubuntu0.1, 4.2.7-0ubuntu0.1, and 4.4.1.
To fix CVE-2020-22033 on Ubuntu, you should update FFmpeg to version 4.4.2-0ubuntu0.21.10.1, 3.4.11-0ubuntu0.1, or 4.2.7-0ubuntu0.1.
You can find more information about CVE-2020-22033 on the CVE website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033), the FFmpeg trac ticket (https://trac.ffmpeg.org/ticket/8246), and the Ubuntu Security Notice USN-5472-1 (https://ubuntu.com/security/notices/USN-5472-1).