6.5
CVSSv3

CVE-2020-22021

Published: 26/05/2021 Updated: 05/11/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that FFmpeg incorrectly handled file conversion to APNG format. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-21041)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ffmpeg ffmpeg 4.2

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #989439 CVE-2020-22033 CVE-2020-22021 CVE-2020-22019 CVE-2020-22015 CVE-2020-21041 Package: ffmpeg; Maintainer for ffmpeg is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for ffmpeg is src:ffmpeg (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> ...
Several security issues were fixed in FFmpeg ...
Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed For the oldstable distribution (buster), these problems have been fixed in version 7:418-0+deb10u1 We recommend that you upgrade your ffm ...
A buffer overflow vulnerability in FFmpeg 42 at filter_edges function in libavfilter/vf_yadifc could let a remote malicious user cause a denial of service ...