First published: Fri Apr 19 2024(Updated: )
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:3.4.11-0ubuntu0.1+ | 7:3.4.11-0ubuntu0.1+ |
ubuntu/ffmpeg | <7:4.2.7-0ubuntu0.1+ | 7:4.2.7-0ubuntu0.1+ |
ubuntu/ffmpeg | <7:4.4.2-0ubuntu0.22.04.1+ | 7:4.4.2-0ubuntu0.22.04.1+ |
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
debian/ffmpeg | <=7:4.3.6-0+deb11u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.7-0+deb11u1 7:5.1.5-0+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51798 is considered a high severity vulnerability due to the potential for local attackers to execute arbitrary code.
To fix CVE-2023-51798, update the FFmpeg package to one of the following versions: 7:3.4.11-0ubuntu0.1+, 7:4.2.7-0ubuntu0.1+, 7:4.4.2-0ubuntu0.22.04.1+, or 7:6.0-6ubuntu1.1.
CVE-2023-51798 affects multiple versions of the FFmpeg package, including specific Ubuntu and Debian versions.
A buffer overflow in CVE-2023-51798 occurs when excessive data is written to a buffer, causing adjacent memory to be overwritten.
CVE-2023-51798 requires local access for exploitation, making it less of a risk compared to remote vulnerabilities.