{"vulnerability": "CVE-2021-3566", "sightings": [{"uuid": "cb15e117-7d45-4b27-a7eb-2915e562ddbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3566", "type": "seen", "source": "https://t.me/cibsecurity/26899", "content": "\u203c CVE-2021-3566 \u203c\n\nPrior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate \"ffconcat\" file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-06T00:31:39.000000Z"}]}