CVE-2025-25471

4.3 MEDIUM

📋 TL;DR

This vulnerability is a NULL pointer dereference in FFmpeg's MOV file format parser that can cause a denial of service (crash) when processing specially crafted media files. It affects systems running vulnerable versions of FFmpeg that process MOV/QuickTime files. The impact is limited to application crashes rather than remote code execution.

💻 Affected Systems

Products:
  • FFmpeg
Versions: git master versions before commit fd1772b7475d0d5673a5dd314ee78443d0be4cf1
Operating Systems: All platforms running FFmpeg
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects FFmpeg when processing MOV/QuickTime format files. Other formats are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for media processing services, potentially disrupting workflows that rely on FFmpeg for video processing.

🟠

Likely Case

Application crash when processing malicious MOV files, requiring restart of the affected FFmpeg process or service.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing; crashes would be contained to isolated processes.

🌐 Internet-Facing: MEDIUM - Web services processing user-uploaded media files could be disrupted by targeted attacks.
🏢 Internal Only: LOW - Internal media processing workflows could be disrupted but typically have lower attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires feeding a specially crafted MOV file to FFmpeg. No authentication is needed if the application processes external files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: git commit fd1772b7475d0d5673a5dd314ee78443d0be4cf1 and later

Vendor Advisory: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/fd1772b7475d0d5673a5dd314ee78443d0be4cf1

Restart Required: Yes

Instructions:

1. Update FFmpeg to latest git master or a version containing commit fd1772b7475d0d5673a5dd314ee78443d0be4cf1. 2. Recompile if using source. 3. Restart any services using FFmpeg.

🔧 Temporary Workarounds

Disable MOV format processing

all

Prevent FFmpeg from processing MOV/QuickTime files to avoid the vulnerable code path

ffmpeg -formats | grep -v mov
Configure applications to reject MOV files

Sandbox FFmpeg execution

linux

Run FFmpeg in a container or sandbox to limit impact of crashes

docker run --rm -v $(pwd):/data ffmpeg
Use bubblewrap or similar sandboxing tools

🧯 If You Can't Patch

  • Implement strict input validation to reject suspicious MOV files before processing
  • Monitor FFmpeg processes for crashes and implement automatic restart mechanisms

🔍 How to Verify

Check if Vulnerable:

Check FFmpeg version: ffmpeg -version | grep 'git-' and verify if commit fd1772b7475d0d5673a5dd314ee78443d0be4cf1 is present

Check Version:

ffmpeg -version | head -1

Verify Fix Applied:

After update, verify the commit is included: git log --oneline | grep fd1772b7475d0d5673a5dd314ee78443d0be4cf1

📡 Detection & Monitoring

Log Indicators:

  • FFmpeg segmentation fault or crash logs
  • Application logs showing failed media processing

Network Indicators:

  • Unusual volume of MOV file uploads to media processing services

SIEM Query:

process.name:"ffmpeg" AND event.action:"crashed" OR event.outcome:"failure"

🔗 References

📤 Share & Export