Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for ffmpeg
.
ffmpeg is a FFmpeg wrapper
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the cached
function. An attacker can cause a crash or potentially execute arbitrary code by providing dimension parameters that are zero or exceed the maximum value for a 32-bit integer, resulting in an unchecked cast and undefined behavior.
// Safe Rust code that triggers UB
let mut scaler = SwsContextWrapper::new();
// Zero height
scaler.cached(
format::Pixel::YUV420P,
1920,
0, // src_h is zero → cast to 0
format::Pixel::RGBA,
1280,
720,
Flags::BILINEAR,
);
// This call passes srcH == 0 into sws_getCachedContext, violating
// the contract "srcH must be strictly positive", leading to UB.
// Overflow to negative
let huge = i32::MAX as u32 + 1; // 2147483648
scaler.cached(
format::Pixel::YUV420P,
huge, // wraps to -2147483648
1080,
format::Pixel::RGBA,
1280,
720,
Flags::BILINEAR,
);
// srcW becomes -2147483648 in C, again violating "must be > 0"
// and causing Undefined Behavior.