CVE-2023-49528

8.0 HIGH

📋 TL;DR

A buffer overflow vulnerability in FFmpeg's de_stereo component allows local attackers to execute arbitrary code or cause denial of service. This affects FFmpeg version n6.1-3-g466799d4f5 and potentially other versions. Systems using vulnerable FFmpeg builds for audio processing are at risk.

💻 Affected Systems

Products:
  • FFmpeg
Versions: n6.1-3-g466799d4f5 and potentially earlier versions with same code
Operating Systems: Linux, Windows, macOS - any OS running vulnerable FFmpeg
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing audio through the de_stereo component in the af_dialoguenhance filter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise via arbitrary code execution.

🟠

Likely Case

Denial of service (application crash) or limited code execution in the context of the FFmpeg process.

🟢

If Mitigated

Minimal impact if proper sandboxing/containerization isolates FFmpeg processes.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit, but requires specific audio processing scenarios.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific audio processing. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in FFmpeg git commit after n6.1-3-g466799d4f5 - check specific distribution patches

Vendor Advisory: https://trac.ffmpeg.org/ticket/10691

Restart Required: Yes

Instructions:

1. Update FFmpeg to patched version from official repository. 2. For Linux distributions: Use package manager (apt/yum/dnf) to update ffmpeg package. 3. Restart any services using FFmpeg.

🔧 Temporary Workarounds

Disable af_dialoguenhance filter

all

Prevent use of vulnerable audio filter component

Modify FFmpeg configurations to avoid '-af dialoguenhance' parameter

Sandbox FFmpeg execution

linux

Run FFmpeg in restricted environment to limit impact

Use containers (Docker with limited capabilities)
Use seccomp-bpf filters
Run as unprivileged user

🧯 If You Can't Patch

  • Implement strict access controls to limit local users who can execute FFmpeg
  • Monitor for abnormal FFmpeg process behavior or crashes

🔍 How to Verify

Check if Vulnerable:

Check FFmpeg version: ffmpeg -version | grep 'version' and compare to known vulnerable versions

Check Version:

ffmpeg -version | head -1

Verify Fix Applied:

Verify updated version no longer matches vulnerable version string and test audio processing with dialoguenhance filter

📡 Detection & Monitoring

Log Indicators:

  • FFmpeg segmentation faults/crashes
  • Abnormal process termination when processing audio

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Process:Name='ffmpeg' AND EventID='1000' (Windows crash) OR 'segmentation fault' in syslog (Linux)

🔗 References

📤 Share & Export