CVE-2021-3566
Published: 5 August 2021
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate "ffconcat" file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg).
Priority
Status
Package | Release | Status |
---|---|---|
ffmpeg Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(7:3.4.11-0ubuntu0.1+esm2)
|
focal |
Not vulnerable
(7:4.2.7-0ubuntu0.1)
|
|
hirsute |
Not vulnerable
(4.3)
|
|
impish |
Not vulnerable
(7:4.4-6ubuntu5)
|
|
jammy |
Not vulnerable
(7:4.4.1-3ubuntu2)
|
|
kinetic |
Not vulnerable
(7:4.4.1-3ubuntu2)
|
|
lunar |
Not vulnerable
(7:4.4.1-3ubuntu2)
|
|
mantic |
Not vulnerable
(7:4.4.1-3ubuntu2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.2.6)
|
|
xenial |
Released
(7:2.8.17-0ubuntu0.1+esm4)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |