First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:4.3.6-0+deb11u1<=7:4.3.7-0+deb11u1<=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49501 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2023-49501, update ffmpeg to version 7:6.1.1-3ubuntu5+ or later on Ubuntu, and ensure affected versions are patched on Debian.
CVE-2023-49501 affects users of ffmpeg versions prior to 7:6.1.1-3ubuntu5+ on Ubuntu and earlier versions on Debian.
CVE-2023-49501 is caused by a buffer overflow vulnerability in the config_eq_output function found in the libavfilter component.
CVE-2023-49501 requires local access for exploitation, making remote attacks unlikely.