First published: Mon Sep 20 2021(Updated: )
An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It allows an attacker to cause Code Execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Faad2 Project Faad2 | <=2.10.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/faad2 | <2.8.8-1ubuntu0.1~ | 2.8.8-1ubuntu0.1~ |
ubuntu/faad2 | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
ubuntu/faad2 | <2.7-8+ | 2.7-8+ |
ubuntu/faad2 | <2.8.0~ | 2.8.0~ |
debian/faad2 | 2.10.0-1~deb10u1 2.10.0-1 2.10.1-1 2.11.1-1 | |
<=2.10.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32273 is a vulnerability in the faad2 library that allows an attacker to execute code via a stack buffer overflow.
CVE-2021-32273 affects faad2 versions up to and including 2.10.0.
The severity of CVE-2021-32273 is high.
To fix CVE-2021-32273 on Ubuntu, update faad2 to version 2.8.8-1ubuntu0.1~ (for Bionic), 2.9.1-1ubuntu0.1 (for Focal), or 2.7-8+ (for Trusty).
To fix CVE-2021-32273 on Debian, update faad2 to version 2.10.0-1~deb10u1, 2.10.0-1, or 2.10.1-1.