First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavutil/imgutils.c:353:9 in image_copy_plane.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:4.4.2-0ubuntu0.22.04.1+ | 7:4.4.2-0ubuntu0.22.04.1+ |
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
debian/ffmpeg | <=7:4.3.6-0+deb11u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.7-0+deb11u1 7:5.1.5-0+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51793 is classified as a high severity buffer overflow vulnerability.
To fix CVE-2023-51793, update Ffmpeg to version 7:4.4.2-0ubuntu0.22.04.1+ or 7:6.0-6ubuntu1.1 or a later version.
CVE-2023-51793 affects users of specific versions of Ffmpeg, especially those on Ubuntu and Debian systems.
Attackers exploiting CVE-2023-51793 can execute arbitrary code on the target system.
CVE-2023-51793 involves a buffer overflow vulnerability in the libavutil/imgutils.c component of Ffmpeg.