First published: Wed May 26 2021(Updated: )
Buffer Overflow vulnerability in FFMpeg 4.2.3 in dnn_execute_layer_pad in libavfilter/dnn/dnn_backend_native_layer_pad.c due to a call to memcpy without length checks, which could let a remote malicious user execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg | =4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24020 has been classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2020-24020, you should upgrade to FFmpeg version 4.2.4 or later where the vulnerability has been addressed.
CVE-2020-24020 can lead to arbitrary code execution, which may compromise the confidentiality, integrity, and availability of your system.
Your system is affected by CVE-2020-24020 if you are using FFmpeg version 4.2.3.
The nature of CVE-2020-24020 is a buffer overflow due to unsafe memory operations in the FFmpeg codebase.