CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
43.1%
It was discovered that FFmpeg did not properly handle certain inputs in
vf_lagfun.c, resulting in a buffer overflow vulnerability. An attacker
could possibly use this issue to cause a denial of service via application
crash. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-22024)
It was discovered that FFmpeg incorrectly managed memory in avienc.c,
resulting in a memory leak. An attacker could possibly use this issue
to cause a denial of service via application crash. (CVE-2020-22039)
It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in frame.c. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue affected
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22040)
It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in fifo.c. An attacker could possibly use this issue to cause
a denial of service via application crash. (CVE-2020-22043)
It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in vf_tile.c. If a user or automated system were tricked into
processing a specially crafted MOV file, an attacker could possibly use
this issue to cause a denial of service. (CVE-2020-22051)
It was discovered that FFmpeg incorrectly handled certain MOV files in
timecode.c, leading to an integer overflow. An attacker could possibly
use this issue to cause a denial of service using a crafted MOV file.
This issue only affected Ubuntu 16.04 LTS. (CVE-2021-28429)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | ffmpeg | < 7:4.2.7-0ubuntu0.1+esm2 | UNKNOWN |
Ubuntu | 20.04 | noarch | ffmpeg | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | ffmpeg-dbgsym | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | ffmpeg-doc | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec-dev | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec-extra | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec-extra58 | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec-extra58-dbgsym | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec58 | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libavcodec58-dbgsym | < 7:4.2.7-0ubuntu0.1 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
43.1%