CVE-2025-1594 (GCVE-0-2025-1594)

Vulnerability from cvelistv5 – Published: 2025-02-23 21:00 – Updated: 2025-02-24 12:03
VLAI?
Summary
A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
References
Impacted products
Vendor Product Version
n/a FFmpeg Affected: 3.4.0
Affected: 3.4.1
Affected: 3.4.2
Affected: 3.4.3
Affected: 3.4.4
Affected: 3.4.5
Affected: 3.4.6
Affected: 3.4.7
Affected: 3.4.8
Affected: 3.4.9
Affected: 3.4.10
Affected: 3.4.11
Affected: 3.4.12
Affected: 3.4.13
Affected: 4.2.0
Affected: 4.2.1
Affected: 4.2.2
Affected: 4.2.3
Affected: 4.2.4
Affected: 4.2.5
Affected: 4.2.6
Affected: 4.2.7
Affected: 4.2.8
Affected: 4.2.9
Affected: 4.2.10
Affected: 4.3.0
Affected: 4.3.1
Affected: 4.3.2
Affected: 4.3.3
Affected: 4.3.4
Affected: 4.3.5
Affected: 4.3.6
Affected: 4.3.7
Affected: 4.3.8
Affected: 4.4.0
Affected: 4.4.1
Affected: 4.4.2
Affected: 4.4.3
Affected: 4.4.4
Affected: 4.4.5
Affected: 5.1.0
Affected: 5.1.1
Affected: 5.1.2
Affected: 5.1.3
Affected: 5.1.4
Affected: 5.1.5
Affected: 5.1.6
Affected: 6.1.0
Affected: 6.1.1
Affected: 6.1.2
Affected: 7.0
Affected: 7.0.0
Affected: 7.0.1
Affected: 7.0.2
Affected: 7.1
Credits
0x20z (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1594",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-24T12:02:17.104118Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-24T12:03:02.141Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "AAC Encoder"
          ],
          "product": "FFmpeg",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "3.4.0"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.4.2"
            },
            {
              "status": "affected",
              "version": "3.4.3"
            },
            {
              "status": "affected",
              "version": "3.4.4"
            },
            {
              "status": "affected",
              "version": "3.4.5"
            },
            {
              "status": "affected",
              "version": "3.4.6"
            },
            {
              "status": "affected",
              "version": "3.4.7"
            },
            {
              "status": "affected",
              "version": "3.4.8"
            },
            {
              "status": "affected",
              "version": "3.4.9"
            },
            {
              "status": "affected",
              "version": "3.4.10"
            },
            {
              "status": "affected",
              "version": "3.4.11"
            },
            {
              "status": "affected",
              "version": "3.4.12"
            },
            {
              "status": "affected",
              "version": "3.4.13"
            },
            {
              "status": "affected",
              "version": "4.2.0"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.2.3"
            },
            {
              "status": "affected",
              "version": "4.2.4"
            },
            {
              "status": "affected",
              "version": "4.2.5"
            },
            {
              "status": "affected",
              "version": "4.2.6"
            },
            {
              "status": "affected",
              "version": "4.2.7"
            },
            {
              "status": "affected",
              "version": "4.2.8"
            },
            {
              "status": "affected",
              "version": "4.2.9"
            },
            {
              "status": "affected",
              "version": "4.2.10"
            },
            {
              "status": "affected",
              "version": "4.3.0"
            },
            {
              "status": "affected",
              "version": "4.3.1"
            },
            {
              "status": "affected",
              "version": "4.3.2"
            },
            {
              "status": "affected",
              "version": "4.3.3"
            },
            {
              "status": "affected",
              "version": "4.3.4"
            },
            {
              "status": "affected",
              "version": "4.3.5"
            },
            {
              "status": "affected",
              "version": "4.3.6"
            },
            {
              "status": "affected",
              "version": "4.3.7"
            },
            {
              "status": "affected",
              "version": "4.3.8"
            },
            {
              "status": "affected",
              "version": "4.4.0"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.4.4"
            },
            {
              "status": "affected",
              "version": "4.4.5"
            },
            {
              "status": "affected",
              "version": "5.1.0"
            },
            {
              "status": "affected",
              "version": "5.1.1"
            },
            {
              "status": "affected",
              "version": "5.1.2"
            },
            {
              "status": "affected",
              "version": "5.1.3"
            },
            {
              "status": "affected",
              "version": "5.1.4"
            },
            {
              "status": "affected",
              "version": "5.1.5"
            },
            {
              "status": "affected",
              "version": "5.1.6"
            },
            {
              "status": "affected",
              "version": "6.1.0"
            },
            {
              "status": "affected",
              "version": "6.1.1"
            },
            {
              "status": "affected",
              "version": "6.1.2"
            },
            {
              "status": "affected",
              "version": "7.0"
            },
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.1"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "0x20z (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        },
        {
          "lang": "de",
          "value": "Es wurde eine kritische Schwachstelle in FFmpeg bis 7.1 gefunden. Betroffen hiervon ist die Funktion ff_aac_search_for_tns der Datei libavcodec/aacenc_tns.c der Komponente AAC Encoder. Durch das Manipulieren mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "Memory Corruption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-23T21:00:13.152Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-296589 | FFmpeg AAC Encoder aacenc_tns.c ff_aac_search_for_tns stack-based overflow",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.296589"
        },
        {
          "name": "VDB-296589 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.296589"
        },
        {
          "name": "Submit #496929 | FFmpeg git master stack-buffer-overflow",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.496929"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://trac.ffmpeg.org/ticket/11418#comment:3"
        },
        {
          "tags": [
            "exploit",
            "issue-tracking"
          ],
          "url": "https://trac.ffmpeg.org/attachment/ticket/11418/poc"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://ffmpeg.org/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-02-22T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-02-22T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-02-22T23:15:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "FFmpeg AAC Encoder aacenc_tns.c ff_aac_search_for_tns stack-based overflow"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-1594",
    "datePublished": "2025-02-23T21:00:13.152Z",
    "dateReserved": "2025-02-22T22:10:24.824Z",
    "dateUpdated": "2025-02-24T12:03:02.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-1594\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-02-23T21:15:09.130\",\"lastModified\":\"2025-06-03T18:04:04.387\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en FFmpeg hasta la versi\u00f3n 7.1. Afecta a la funci\u00f3n ff_aac_search_for_tns del archivo libavcodec/aacenc_tns.c del componente AAC Encoder. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"},{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.1\",\"matchCriteriaId\":\"B584192F-F1AD-478F-A026-617BBE5A0D8D\"}]}]}],\"references\":[{\"url\":\"https://ffmpeg.org/\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Product\"]},{\"url\":\"https://trac.ffmpeg.org/attachment/ticket/11418/poc\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://trac.ffmpeg.org/ticket/11418#comment:3\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.296589\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.296589\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.496929\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-1594\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-24T12:02:17.104118Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-24T12:02:55.812Z\"}}], \"cna\": {\"title\": \"FFmpeg AAC Encoder aacenc_tns.c ff_aac_search_for_tns stack-based overflow\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"0x20z (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 6.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 7.5, \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\"}}], \"affected\": [{\"vendor\": \"n/a\", \"modules\": [\"AAC Encoder\"], \"product\": \"FFmpeg\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.4.0\"}, {\"status\": \"affected\", \"version\": \"3.4.1\"}, {\"status\": \"affected\", \"version\": \"3.4.2\"}, {\"status\": \"affected\", \"version\": \"3.4.3\"}, {\"status\": \"affected\", \"version\": \"3.4.4\"}, {\"status\": \"affected\", \"version\": \"3.4.5\"}, {\"status\": \"affected\", \"version\": \"3.4.6\"}, {\"status\": \"affected\", \"version\": \"3.4.7\"}, {\"status\": \"affected\", \"version\": \"3.4.8\"}, {\"status\": \"affected\", \"version\": \"3.4.9\"}, {\"status\": \"affected\", \"version\": \"3.4.10\"}, {\"status\": \"affected\", \"version\": \"3.4.11\"}, {\"status\": \"affected\", \"version\": \"3.4.12\"}, {\"status\": \"affected\", \"version\": \"3.4.13\"}, {\"status\": \"affected\", \"version\": \"4.2.0\"}, {\"status\": \"affected\", \"version\": \"4.2.1\"}, {\"status\": \"affected\", \"version\": \"4.2.2\"}, {\"status\": \"affected\", \"version\": \"4.2.3\"}, {\"status\": \"affected\", \"version\": \"4.2.4\"}, {\"status\": \"affected\", \"version\": \"4.2.5\"}, {\"status\": \"affected\", \"version\": \"4.2.6\"}, {\"status\": \"affected\", \"version\": \"4.2.7\"}, {\"status\": \"affected\", \"version\": \"4.2.8\"}, {\"status\": \"affected\", \"version\": \"4.2.9\"}, {\"status\": \"affected\", \"version\": \"4.2.10\"}, {\"status\": \"affected\", \"version\": \"4.3.0\"}, {\"status\": \"affected\", \"version\": \"4.3.1\"}, {\"status\": \"affected\", \"version\": \"4.3.2\"}, {\"status\": \"affected\", \"version\": \"4.3.3\"}, {\"status\": \"affected\", \"version\": \"4.3.4\"}, {\"status\": \"affected\", \"version\": \"4.3.5\"}, {\"status\": \"affected\", \"version\": \"4.3.6\"}, {\"status\": \"affected\", \"version\": \"4.3.7\"}, {\"status\": \"affected\", \"version\": \"4.3.8\"}, {\"status\": \"affected\", \"version\": \"4.4.0\"}, {\"status\": \"affected\", \"version\": \"4.4.1\"}, {\"status\": \"affected\", \"version\": \"4.4.2\"}, {\"status\": \"affected\", \"version\": \"4.4.3\"}, {\"status\": \"affected\", \"version\": \"4.4.4\"}, {\"status\": \"affected\", \"version\": \"4.4.5\"}, {\"status\": \"affected\", \"version\": \"5.1.0\"}, {\"status\": \"affected\", \"version\": \"5.1.1\"}, {\"status\": \"affected\", \"version\": \"5.1.2\"}, {\"status\": \"affected\", \"version\": \"5.1.3\"}, {\"status\": \"affected\", \"version\": \"5.1.4\"}, {\"status\": \"affected\", \"version\": \"5.1.5\"}, {\"status\": \"affected\", \"version\": \"5.1.6\"}, {\"status\": \"affected\", \"version\": \"6.1.0\"}, {\"status\": \"affected\", \"version\": \"6.1.1\"}, {\"status\": \"affected\", \"version\": \"6.1.2\"}, {\"status\": \"affected\", \"version\": \"7.0\"}, {\"status\": \"affected\", \"version\": \"7.0.0\"}, {\"status\": \"affected\", \"version\": \"7.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.2\"}, {\"status\": \"affected\", \"version\": \"7.1\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-02-22T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-02-22T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-02-22T23:15:30.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.296589\", \"name\": \"VDB-296589 | FFmpeg AAC Encoder aacenc_tns.c ff_aac_search_for_tns stack-based overflow\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.296589\", \"name\": \"VDB-296589 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.496929\", \"name\": \"Submit #496929 | FFmpeg git master stack-buffer-overflow\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://trac.ffmpeg.org/ticket/11418#comment:3\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://trac.ffmpeg.org/attachment/ticket/11418/poc\", \"tags\": [\"exploit\", \"issue-tracking\"]}, {\"url\": \"https://ffmpeg.org/\", \"tags\": [\"product\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\"}, {\"lang\": \"de\", \"value\": \"Es wurde eine kritische Schwachstelle in FFmpeg bis 7.1 gefunden. Betroffen hiervon ist die Funktion ff_aac_search_for_tns der Datei libavcodec/aacenc_tns.c der Komponente AAC Encoder. Durch das Manipulieren mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \\u00fcber das Netzwerk. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"Stack-based Buffer Overflow\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"Memory Corruption\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-02-23T21:00:13.152Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-1594\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-24T12:03:02.141Z\", \"dateReserved\": \"2025-02-22T22:10:24.824Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-02-23T21:00:13.152Z\", \"assignerShortName\": \"VulDB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…