First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via theav_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.6-0+deb11u1 7:4.3.7-0+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50007 is classified as a critical buffer overflow vulnerability that can lead to arbitrary code execution.
To mitigate CVE-2023-50007, update Ffmpeg to version 7:6.0-6ubuntu1.1 or later for Ubuntu systems.
CVE-2023-50007 exists in Ffmpeg versions prior to 7:6.0-6ubuntu1.1, 7:6.1.1-3ubuntu5+, and certain versions from Debian.
Local attackers on systems running affected versions of Ffmpeg may exploit CVE-2023-50007 to execute arbitrary code.
CVE-2023-50007 specifically impacts the av_samples_set_silence function in the libavutil/samplefmt.c file.