CVE-2025-57614

7.5 HIGH

📋 TL;DR

An integer overflow and invalid input vulnerability in rust-ffmpeg's cached method allows attackers to cause denial of service or potentially execute arbitrary code. This affects applications using rust-ffmpeg 0.3.0 after commit 5ac0527 for video processing. Attackers can trigger undefined behavior by providing dimension parameters that are zero or exceed i32::MAX.

💻 Affected Systems

Products:
  • rust-ffmpeg
Versions: 0.3.0 (after commit 5ac0527)
Operating Systems: All platforms running rust-ffmpeg
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the vulnerable cached method with untrusted input

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise and data exfiltration

🟠

Likely Case

Application crash and denial of service affecting video processing functionality

🟢

If Mitigated

Controlled application termination with no data loss if proper input validation is implemented

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific input parameters but no authentication is needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue for latest patched version

Vendor Advisory: https://github.com/meh/rust-ffmpeg/issues/192

Restart Required: Yes

Instructions:

1. Check the GitHub issue for patch availability
2. Update rust-ffmpeg dependency to patched version
3. Rebuild and redeploy affected applications
4. Restart services using rust-ffmpeg

🔧 Temporary Workarounds

Input validation wrapper

all

Add validation layer to check dimension parameters before passing to cached method

Implement parameter validation: ensure dimensions > 0 and <= i32::MAX

🧯 If You Can't Patch

  • Implement strict input validation for all dimension parameters
  • Disable or restrict access to affected video processing functionality

🔍 How to Verify

Check if Vulnerable:

Check Cargo.toml for rust-ffmpeg version 0.3.0 and verify commit hash is after 5ac0527

Check Version:

grep rust-ffmpeg Cargo.toml

Verify Fix Applied:

Verify rust-ffmpeg dependency is updated to version with fix applied

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unexpected termination of video processing services
  • Memory allocation errors in logs

Network Indicators:

  • Unusual video file uploads with extreme dimension values
  • Repeated connection attempts to video processing endpoints

SIEM Query:

source="application.logs" AND ("segmentation fault" OR "SIGSEGV") AND process="*ffmpeg*"

🔗 References

📤 Share & Export