First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:3.4.11-0ubuntu0.1+ | 7:3.4.11-0ubuntu0.1+ |
ubuntu/ffmpeg | <7:4.2.7-0ubuntu0.1+ | 7:4.2.7-0ubuntu0.1+ |
ubuntu/ffmpeg | <7:4.4.2-0ubuntu0.22.04.1+ | 7:4.4.2-0ubuntu0.22.04.1+ |
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:4.3.6-0+deb11u1<=7:4.3.7-0+deb11u1<=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49502 is classified as a high severity vulnerability due to potential arbitrary code execution.
To fix CVE-2023-49502, update ffmpeg to a secure version such as 7:3.4.11-0ubuntu0.1+, 7:4.2.7-0ubuntu0.1+, 7:4.4.2-0ubuntu0.22.04.1+, or later versions listed for your specific distribution.
CVE-2023-49502 affects users of ffmpeg versions prior to the fixed versions specified for Ubuntu and Debian.
CVE-2023-49502 involves the libavfilter component, specifically the ff_bwdif_filter_intra_c function.
CVE-2023-49502 requires local access for exploitation, making it less impactful from a remote attack perspective.