Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian LTS: Security Advisory for ffmpeg (DLA-2291-1)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

The remote host is missing an update for the 'ffmpeg' package(s) announced via the DLA-2291-1 advisory.

Insight

Insight

Several vulnerabilities have been fixed by upgrading FFmpeg, a widely used multimedia framework, from 3.2.14 to 3.2.15. CVE-2019-13390 rawenc: Only accept the appropriate stream type for raw muxers. CVE-2019-17542 Heap-based buffer overflow in vqa_decode_chunk. CVE-2020-13904 Use-after-free via a crafted EXTINF duration in an m3u8 file.

Affected Software

Affected Software

'ffmpeg' package(s) on Debian Linux.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

For Debian 9 stretch, these problems have been fixed in version 7:3.2.15-0+deb9u1. Several other bugs are also fixed in 3.2.15, a full list of changes is available at the linked references. We recommend that you upgrade your ffmpeg packages.

Common Vulnerabilities and Exposures (CVE)