CVE-2023-49501

8.0 HIGH

📋 TL;DR

A buffer overflow vulnerability in FFmpeg's config_eq_output function allows local attackers to execute arbitrary code. This affects systems running vulnerable FFmpeg versions where local users can trigger audio filter processing. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • FFmpeg
Versions: v.n6.1-3-g466799d4f5 and potentially earlier versions
Operating Systems: Linux, Windows, macOS - any OS running vulnerable FFmpeg
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in libavfilter/asrc_afirsrc.c component when processing audio filters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local user gains elevated privileges, potentially accessing sensitive data or disrupting system operations.

🟢

If Mitigated

Limited impact due to proper privilege separation and minimal local attack surface.

🌐 Internet-Facing: LOW - Requires local access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users could exploit if they have access to trigger vulnerable function.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific audio filter processing functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check FFmpeg git repository for fixes after commit 466799d4f5

Vendor Advisory: https://trac.ffmpeg.org/ticket/10686

Restart Required: No

Instructions:

1. Update FFmpeg to latest version from official repository. 2. For package managers: 'sudo apt update && sudo apt upgrade ffmpeg' (Debian/Ubuntu) or 'sudo yum update ffmpeg' (RHEL/CentOS). 3. Recompile from source if using custom builds.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit which users can execute FFmpeg or access audio processing functions

sudo chmod 750 /usr/bin/ffmpeg
sudo setfacl -m u:username:rx /usr/bin/ffmpeg

Disable vulnerable component

all

Avoid using the asrc_afirsrc audio filter if possible

🧯 If You Can't Patch

  • Implement strict privilege separation - run FFmpeg with minimal privileges using sudo restrictions or containers
  • Monitor for unusual FFmpeg process execution patterns and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check FFmpeg version: 'ffmpeg -version' and compare with vulnerable version range

Check Version:

ffmpeg -version | head -1

Verify Fix Applied:

Verify updated version no longer contains vulnerable commit: 'ffmpeg -version | grep -i version'

📡 Detection & Monitoring

Log Indicators:

  • Unusual FFmpeg process execution by non-privileged users
  • Segmentation faults in FFmpeg processes
  • Privilege escalation attempts following FFmpeg execution

Network Indicators:

  • None - local vulnerability

SIEM Query:

Process creation where parent process is ffmpeg and new process has elevated privileges

🔗 References

📤 Share & Export