Search for vulnerabilities
Vulnerability details: VCID-py6c-5vka-aaaa
Vulnerability ID VCID-py6c-5vka-aaaa
Aliases CVE-2022-3964
Summary A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.
Status Published
Exploitability 0.5
Weighted Severity 7.3
Risk 3.6
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00091 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
epss 0.00207 https://api.first.org/data/v1/epss?cve=CVE-2022-3964
cvssv3.1 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2022-3964
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2022-3964
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-3964
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-3964
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.04893
EPSS Score 0.00028
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.