CVE-2016-2328Improper Restriction of Operations within the Bounds of a Memory Buffer in Ffmpeg

Severity
8.8HIGHNVD
EPSS
1.1%
top 22.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 12
Latest updateMay 17

Description

libswscale/swscale_unscaled.c in FFmpeg before 2.8.6 does not validate certain height values, which allows remote attackers to cause a denial of service (out-of-bounds array read access) or possibly have unspecified other impact via a crafted .cine file, related to the bayer_to_rgb24_wrapper and bayer_to_yv12_wrapper functions.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/ffmpeg< ffmpeg 2.8.6-1 (bookworm)
Debianffmpeg/ffmpeg< 2.8.6-1+3
NVDffmpeg/ffmpeg2.8.5

🔴Vulnerability Details

2
GHSA
GHSA-vfwc-3ghr-j6jc: libswscale/swscale_unscaled2022-05-17
OSV
CVE-2016-2328: libswscale/swscale_unscaled2016-02-12

📋Vendor Advisories

1
Debian
CVE-2016-2328: ffmpeg - libswscale/swscale_unscaled.c in FFmpeg before 2.8.6 does not validate certain h...2016