First published: Mon Sep 20 2021(Updated: )
An issue was discovered in faad2 through 2.10.0. A NULL pointer dereference exists in the function get_sample() located in output.c. It allows an attacker to cause Denial of Service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.10.0 | ||
=9.0 | ||
=10.0 | ||
Faad2 Project Faad2 | <=2.10.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/faad2 | 2.10.0-1~deb10u1 2.10.0-1 2.10.1-1 2.11.1-1 | |
ubuntu/faad2 | <2.8.8-1ubuntu0.1~ | 2.8.8-1ubuntu0.1~ |
ubuntu/faad2 | <2.9.1-1ubuntu0.1 | 2.9.1-1ubuntu0.1 |
ubuntu/faad2 | <2.7-8+ | 2.7-8+ |
ubuntu/faad2 | <2.8.0~ | 2.8.0~ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32276 is a vulnerability discovered in faad2 through version 2.10.0 that allows an attacker to cause a Denial of Service (DoS) by exploiting a NULL pointer dereference in the function get_sample().
An attacker can exploit CVE-2021-32276 by sending a specially crafted input that triggers the NULL pointer dereference in the get_sample() function, causing a DoS.
Versions up to and including 2.10.0 of faad2 are affected by CVE-2021-32276.
To fix the CVE-2021-32276 vulnerability, you should update your faad2 installation to version 2.10.1 or apply the appropriate patches provided by the vendor.
You can find more information about CVE-2021-32276 on the official MITRE CVE website and the relevant vendor security notices.