Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service.
References
Link | Resource |
---|---|
http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ce5274c1385d55892a692998923802023526b765 | |
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html | Mailing List Third Party Advisory |
https://trac.ffmpeg.org/ticket/8239 | Exploit Issue Tracking Vendor Advisory |
https://www.debian.org/security/2021/dsa-4990 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
05 Nov 2021, 21:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4990 - Third Party Advisory |
20 Oct 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Sep 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
03 Jun 2021, 12:38
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765 - Patch, Vendor Advisory | |
References | (MISC) https://trac.ffmpeg.org/ticket/8239 - Exploit, Issue Tracking, Vendor Advisory | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.5 |
CPE | cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:* |
26 May 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-26 20:15
Updated : 2023-12-10 13:55
NVD link : CVE-2020-22020
Mitre link : CVE-2020-22020
CVE.ORG link : CVE-2020-22020
JSON object : View
Products Affected
debian
- debian_linux
ffmpeg
- ffmpeg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')