CVE-2023-6603

7.5 HIGH

📋 TL;DR

This vulnerability in FFmpeg's HLS playlist parsing allows attackers to cause denial of service by triggering a null pointer dereference during initialization with a maliciously crafted HLS playlist. Any system using vulnerable FFmpeg versions to process HLS playlists is affected, including media servers, streaming applications, and video processing tools.

💻 Affected Systems

Products:
  • FFmpeg
Versions: Versions before the fix (specific version depends on distribution - check vendor advisories)
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Any FFmpeg installation with HLS support enabled is vulnerable when processing HLS playlists. This includes both command-line tools and library integrations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption causing media streaming failures, application crashes, and potential system instability on affected servers.

🟠

Likely Case

Application crashes or hangs when processing malicious HLS playlists, disrupting media streaming services temporarily.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing, though service interruptions may still occur.

🌐 Internet-Facing: HIGH - HLS playlists are typically fetched from external sources, making internet-facing media servers particularly vulnerable to crafted playlists.
🏢 Internal Only: MEDIUM - Internal systems processing user-uploaded or generated HLS content remain vulnerable but with reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires feeding a malicious HLS playlist to vulnerable FFmpeg instances. No authentication needed if playlist processing is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific distribution packages (e.g., FFmpeg git commit that fixes the issue)

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2334335

Restart Required: Yes

Instructions:

1. Check your distribution's security advisories. 2. Update FFmpeg package using your package manager (apt-get upgrade ffmpeg, yum update ffmpeg, etc.). 3. Restart any services using FFmpeg. 4. Recompile any custom builds with patched source.

🔧 Temporary Workarounds

Disable HLS processing

all

Disable HLS playlist parsing in FFmpeg if not required

Configure FFmpeg to reject HLS protocols or use input validation filters

Input validation and sanitization

all

Validate and sanitize HLS playlist inputs before processing

Implement pre-processing scripts to check playlist structure

🧯 If You Can't Patch

  • Implement network segmentation to isolate FFmpeg processing systems
  • Use application sandboxing or containerization to limit crash impact

🔍 How to Verify

Check if Vulnerable:

Check FFmpeg version and compare against patched versions from your distribution. Test with known safe HLS playlists to ensure stability.

Check Version:

ffmpeg -version | grep 'version'

Verify Fix Applied:

After update, verify FFmpeg version and test processing of various HLS playlists to ensure no crashes occur.

📡 Detection & Monitoring

Log Indicators:

  • FFmpeg segmentation faults
  • Application crashes with null pointer references
  • HLS processing failures

Network Indicators:

  • Unusual HLS playlist requests to media servers
  • Repeated failed media streaming sessions

SIEM Query:

source="*ffmpeg*" AND ("segmentation fault" OR "null pointer" OR "SIGSEGV")

🔗 References

📤 Share & Export