語系:
https://security-tracker.debian.org/tracker/source-package/ffmpeg
https://security-tracker.debian.org/tracker/CVE-2023-50010
https://security-tracker.debian.org/tracker/CVE-2023-51793
https://security-tracker.debian.org/tracker/CVE-2023-51794
https://security-tracker.debian.org/tracker/CVE-2023-51795
https://security-tracker.debian.org/tracker/CVE-2023-51798
嚴重性: High
ID: 200642
檔案名稱: debian_DSA-5712.nasl
版本: 1.1
類型: local
代理程式: unix
已發布: 2024/6/16
已更新: 2024/6/16
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
風險因素: Medium
分數: 6.7
風險因素: Critical
基本分數: 10
時間分數: 7.4
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2023-51793
風險因素: High
基本分數: 8.8
時間分數: 7.7
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libavcodec59, p-cpe:/a:debian:debian_linux:ffmpeg-doc, p-cpe:/a:debian:debian_linux:libswscale-dev, p-cpe:/a:debian:debian_linux:libavformat-extra59, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:libavformat59, p-cpe:/a:debian:debian_linux:libavformat-extra, p-cpe:/a:debian:debian_linux:libavcodec-dev, p-cpe:/a:debian:debian_linux:libavdevice59, p-cpe:/a:debian:debian_linux:libavdevice-dev, p-cpe:/a:debian:debian_linux:libavfilter-extra, p-cpe:/a:debian:debian_linux:libavcodec-extra59, p-cpe:/a:debian:debian_linux:libavcodec-extra, p-cpe:/a:debian:debian_linux:ffmpeg, p-cpe:/a:debian:debian_linux:libpostproc56, p-cpe:/a:debian:debian_linux:libswresample4, p-cpe:/a:debian:debian_linux:libpostproc-dev, p-cpe:/a:debian:debian_linux:libswscale6, p-cpe:/a:debian:debian_linux:libavfilter-extra8, p-cpe:/a:debian:debian_linux:libavfilter-dev, p-cpe:/a:debian:debian_linux:libavfilter8, p-cpe:/a:debian:debian_linux:libavutil-dev, p-cpe:/a:debian:debian_linux:libavformat-dev, p-cpe:/a:debian:debian_linux:libavutil57, p-cpe:/a:debian:debian_linux:libswresample-dev
必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2024/6/15
弱點發布日期: 2024/4/17
CVE: CVE-2023-50010, CVE-2023-51793, CVE-2023-51794, CVE-2023-51795, CVE-2023-51798, CVE-2024-31585
IAVB: 2024-B-0041