First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the av_malloc function in libavutil/mem.c:105:9 component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.6-0+deb11u1 7:4.3.7-0+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50008 is rated as a high severity vulnerability due to its potential to allow local attackers to execute arbitrary code.
To fix CVE-2023-50008, upgrade to one of the patched versions of ffmpeg, specifically 7:6.1.1-3ubuntu5+ for Ubuntu or 7:5.1.5-0+deb12u1 for Debian.
CVE-2023-50008 affects ffmpeg versions prior to 7:6.0-6ubuntu1.1 for Ubuntu and earlier versions up to 7:5.1.5-0+deb12u1 for Debian.
No, CVE-2023-50008 can only be exploited by a local attacker who has access to the affected system.
The buffer overflow vulnerability in CVE-2023-50008 is located in the av_malloc function within libavutil/mem.c.