vulnerability
FreeBSD: VID-faf7c1d0-f5bb-47b4-a6a8-ef57317b9766 (CVE-2022-3341): ffmpeg -- multiple vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Apr 7, 2023 | Apr 14, 2023 | Dec 10, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 7, 2023
Added
Apr 14, 2023
Modified
Dec 10, 2025
Description
NVD reports: An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability. A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash. A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.
Solutions
freebsd-upgrade-package-ffmpegfreebsd-upgrade-package-ffmpeg4freebsd-upgrade-package-avidemuxfreebsd-upgrade-package-emby-serverfreebsd-upgrade-package-emby-server-develfreebsd-upgrade-package-handbrakefreebsd-upgrade-package-mythtvfreebsd-upgrade-package-mythtv-frontend
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.