FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution.
References
| Link | Resource |
|---|---|
| http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d6f293353c94c7ce200f6e0975ae3de49787f91f | |
| https://security.gentoo.org/glsa/202105-24 | Third Party Advisory |
| https://trac.ffmpeg.org/ticket/8845 | Exploit Vendor Advisory |
| https://trac.ffmpeg.org/ticket/8863 | Exploit Vendor Advisory |
| http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d6f293353c94c7ce200f6e0975ae3de49787f91f | |
| https://security.gentoo.org/glsa/202105-24 | Third Party Advisory |
| https://trac.ffmpeg.org/ticket/8845 | Exploit Vendor Advisory |
| https://trac.ffmpeg.org/ticket/8863 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 06:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d6f293353c94c7ce200f6e0975ae3de49787f91f - | |
| References | () https://security.gentoo.org/glsa/202105-24 - Third Party Advisory | |
| References | () https://trac.ffmpeg.org/ticket/8845 - Exploit, Vendor Advisory | |
| References | () https://trac.ffmpeg.org/ticket/8863 - Exploit, Vendor Advisory |
07 Nov 2023, 03:32
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
Information
Published : 2021-04-07 20:15
Updated : 2024-11-21 06:03
NVD link : CVE-2021-30123
Mitre link : CVE-2021-30123
CVE.ORG link : CVE-2021-30123
JSON object : View
Products Affected
ffmpeg
- ffmpeg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
