Search for vulnerabilities
Vulnerability details: VCID-1ty8-tgqz-7kej
Vulnerability ID VCID-1ty8-tgqz-7kej
Aliases CVE-2024-35369
Summary In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module, a potential security vulnerability exists due to insufficient validation of certain parameters when parsing Speex codec extradata. This vulnerability could lead to integer overflow conditions, potentially resulting in undefined behavior or crashes during the decoding process.
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-35369
cvssv3.1 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://gist.github.com/1047524396/455093807666f2e351d674750c8cd0b8
ssvc Track https://gist.github.com/1047524396/455093807666f2e351d674750c8cd0b8
cvssv3.1 5.5 https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/speexdec.c#L1423
ssvc Track https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/speexdec.c#L1423
cvssv3.1 5.5 https://github.com/ffmpeg/ffmpeg/commit/0895ef0d6d6406ee6cd158fc4d47d80f201b8e9c
ssvc Track https://github.com/ffmpeg/ffmpeg/commit/0895ef0d6d6406ee6cd158fc4d47d80f201b8e9c
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://gist.github.com/1047524396/455093807666f2e351d674750c8cd0b8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T17:11:01Z/ Found at https://gist.github.com/1047524396/455093807666f2e351d674750c8cd0b8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/speexdec.c#L1423
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T17:11:01Z/ Found at https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/speexdec.c#L1423
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://github.com/ffmpeg/ffmpeg/commit/0895ef0d6d6406ee6cd158fc4d47d80f201b8e9c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T17:11:01Z/ Found at https://github.com/ffmpeg/ffmpeg/commit/0895ef0d6d6406ee6cd158fc4d47d80f201b8e9c
Exploit Prediction Scoring System (EPSS)
Percentile 0.02841
EPSS Score 0.00018
Published At April 27, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-11-29T23:41:51.911637+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2024/35xxx/CVE-2024-35369.json 35.0.0