Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file.
References
Link | Resource |
---|---|
https://github.com/rockcarry/ffjpeg/issues/44 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
17 Aug 2023, 14:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:* |
11 Feb 2022, 17:06
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/rockcarry/ffjpeg/issues/44 - Exploit, Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.5 |
CPE | cpe:2.3:a:ffjpeg_project:ffjpeg:*:*:*:*:*:*:*:* | |
CWE | CWE-120 |
08 Feb 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-08 15:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-44957
Mitre link : CVE-2021-44957
CVE.ORG link : CVE-2021-44957
JSON object : View
Products Affected
rockcarry
- ffjpeg
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')