WID-SEC-W-2024-0939
Vulnerability from csaf_certbund
Published
2024-04-21 22:00
Modified
2025-08-25 22:00
Summary
ffmpeg: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das FFmpeg-Projekt besteht aus freien Programmen und Bibliotheken, die es ermöglichen, digitales Video- und Audiomaterial aufzunehmen, zu konvertieren, zu streamen und abzuspielen. Zudem enthält es mit libavcodec eine Audio- und Video-Codec-Sammlung, die verschiedene Codecs zur Verfügung stellt.
Angriff
Ein Angreifer kann mehrere Schwachstellen in ffmpeg ausnutzen, um beliebigen Code auszuführen oder einen 'Denial of Service'-Zustand zu verursachen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das FFmpeg-Projekt besteht aus freien Programmen und Bibliotheken, die es erm\u00f6glichen, digitales Video- und Audiomaterial aufzunehmen, zu konvertieren, zu streamen und abzuspielen. Zudem enth\u00e4lt es mit libavcodec eine Audio- und Video-Codec-Sammlung, die verschiedene Codecs zur Verf\u00fcgung stellt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in ffmpeg ausnutzen, um beliebigen Code auszuf\u00fchren oder einen \u0027Denial of Service\u0027-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0939 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0939.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0939 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0939"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2024-04-21",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276114"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2024-04-21",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276120"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2024-04-21",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276128"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-49501",
"url": "https://trac.ffmpeg.org/ticket/10686"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-49502",
"url": "https://trac.ffmpeg.org/ticket/10688"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51791",
"url": "https://trac.ffmpeg.org/ticket/10738"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51795",
"url": "https://trac.ffmpeg.org/ticket/10749#no1"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51796",
"url": "https://trac.ffmpeg.org/ticket/10753"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51797",
"url": "https://trac.ffmpeg.org/ticket/10756"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51798",
"url": "https://trac.ffmpeg.org/ticket/10758"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-50007",
"url": "https://trac.ffmpeg.org/ticket/10700"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-50008",
"url": "https://trac.ffmpeg.org/ticket/10701"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-50009",
"url": "https://trac.ffmpeg.org/ticket/10699"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-50010",
"url": "https://trac.ffmpeg.org/ticket/10702"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) f\u00fcr CVE-2023-51792",
"url": "https://github.com/strukturag/libde265/issues/427"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-0C24DA3136 vom 2024-04-25",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0c24da3136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1470-1 vom 2024-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018440.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1468-1 vom 2024-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018441.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-808F3961EF vom 2024-05-02",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-808f3961ef"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-4EDAF658B7 vom 2024-05-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-4edaf658b7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6764-1 vom 2024-05-07",
"url": "https://ubuntu.com/security/notices/USN-6764-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-F74FBCE604 vom 2024-05-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-f74fbce604"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-92780A83F9 vom 2024-05-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-92780a83f9"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F93392509C vom 2024-05-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f93392509c"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-55E7E839F1 vom 2024-05-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-55e7e839f1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-AC000E6379 vom 2024-05-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-ac000e6379"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1593-1 vom 2024-05-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1592-1 vom 2024-05-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018499.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-DF7E365B4A vom 2024-05-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-df7e365b4a"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-E94A7220F2 vom 2024-05-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-e94a7220f2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6803-1 vom 2024-05-30",
"url": "https://ubuntu.com/security/notices/USN-6803-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5712 vom 2024-06-15",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00122.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5721 vom 2024-06-26",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00132.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2803-1 vom 2024-08-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019132.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2864-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019157.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3114-1 vom 2024-09-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019351.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3928 vom 2024-10-21",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0862-1 vom 2025-03-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020516.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15010-1 vom 2025-04-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VRV2HFFHZK4M5WT2N2QVH4SDEORPP6SK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15012-1 vom 2025-04-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PBWTPGXISA6QWLKHLVSAH3P2Q3ZIYOT6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1450-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/E5C3GC7VTUMYO4WCWZXPMHKMIVO4WJ3W/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5985 vom 2025-08-25",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00149.html"
}
],
"source_lang": "en-US",
"title": "ffmpeg: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-25T22:00:00.000+00:00",
"generator": {
"date": "2025-08-26T06:35:31.080+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-0939",
"initial_release_date": "2024-04-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-04-24T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-05-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-09T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-05-12T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-08-06T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-21T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-05-04T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "20"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source ffmpeg",
"product": {
"name": "Open Source ffmpeg",
"product_id": "T034326",
"product_identification_helper": {
"cpe": "cpe:/a:ffmpeg:ffmpeg:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-49501",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-49501"
},
{
"cve": "CVE-2023-49502",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-49502"
},
{
"cve": "CVE-2023-50007",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-50007"
},
{
"cve": "CVE-2023-50008",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-50008"
},
{
"cve": "CVE-2023-50009",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-50009"
},
{
"cve": "CVE-2023-50010",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-50010"
},
{
"cve": "CVE-2023-51791",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51791"
},
{
"cve": "CVE-2023-51792",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51792"
},
{
"cve": "CVE-2023-51793",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51793"
},
{
"cve": "CVE-2023-51795",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51795"
},
{
"cve": "CVE-2023-51796",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51796"
},
{
"cve": "CVE-2023-51797",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51797"
},
{
"cve": "CVE-2023-51798",
"product_status": {
"known_affected": [
"T034326",
"2951",
"T002207",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-04-21T22:00:00.000+00:00",
"title": "CVE-2023-51798"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…