First published: Sun Nov 13 2022(Updated: )
A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
FFmpeg FFmpeg | >=4.4<4.4.4 | |
FFmpeg FFmpeg | >=5.0<5.0.3 | |
FFmpeg FFmpeg | >=5.1<5.1.3 | |
FFmpeg FFmpeg | >=4.4<6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3964 is a vulnerability classified as problematic in ffmpeg, specifically in the component QuickTime RPZA Video Encoder.
The severity of CVE-2022-3964 is high, with a CVSS score of 8.1.
CVE-2022-3964 affects an unknown part of the file libavcodec/rpzaenc.c in ffmpeg's QuickTime RPZA Video Encoder.
Yes, CVE-2022-3964 can be exploited remotely.
Yes, a fix for CVE-2022-3964 is available. It is recommended to update to the latest version of ffmpeg.