First published: Fri Apr 12 2024(Updated: )
Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.6-0+deb11u1 7:4.3.7-0+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49528 is a high-severity vulnerability due to its potential for arbitrary code execution and denial of service.
To fix CVE-2023-49528, upgrade to the patched versions of FFmpeg specified for your distribution, such as 7:6.0-6ubuntu1.1 for Ubuntu.
CVE-2023-49528 affects FFmpeg versions n6.1-3-g466799d4f5 and earlier, particularly on Ubuntu and Debian systems.
Local attackers on systems running vulnerable versions of FFmpeg can exploit CVE-2023-49528.
CVE-2023-49528 is classified as a buffer overflow vulnerability affecting the de_stereo component of FFmpeg.