4.3
CVSSv2

CVE-2020-22033

Published: 27/05/2021 Updated: 26/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that FFmpeg incorrectly handled file conversion to APNG format. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-21041)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ffmpeg ffmpeg 4.2

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #989439 CVE-2020-22033 CVE-2020-22021 CVE-2020-22019 CVE-2020-22015 CVE-2020-21041 Package: ffmpeg; Maintainer for ffmpeg is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for ffmpeg is src:ffmpeg (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> ...
Several security issues were fixed in FFmpeg ...
Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed For the oldstable distribution (buster), these problems have been fixed in version 7:418-0+deb10u1 We recommend that you upgrade your ffm ...
A heap-based buffer overflow vulnerability exists in FFmpeg 42 at libavfilter/vf_vmafmotionc in convolution_y_8bit, which could let a remote malicious user cause a denial of service ...