FFmpeg libswresample heap overflow (<=5.1.5) fixed in 5.1.6/6.0
CVE-2024-7272 Published on August 12, 2024

FFmpeg swresample.c fill_audiodata heap-based overflow
A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.

NVD

Timeline

CVE reserved

Advisory disclosed 9 days later.

VulDB entry created

VulDB entry last update

Weakness Type

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().


Products Associated with CVE-2024-7272

Want to know whenever a new CVE is published for FFmpeg? stack.watch will email you.

 

Exploit Probability

EPSS
0.20%
Percentile
42.44%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.