Language:
https://security-tracker.debian.org/tracker/source-package/ffmpeg
https://www.debian.org/lts/security/2021/dla-2742
https://security-tracker.debian.org/tracker/CVE-2020-21041
https://security-tracker.debian.org/tracker/CVE-2020-22015
https://security-tracker.debian.org/tracker/CVE-2020-22016
https://security-tracker.debian.org/tracker/CVE-2020-22020
https://security-tracker.debian.org/tracker/CVE-2020-22021
https://security-tracker.debian.org/tracker/CVE-2020-22022
https://security-tracker.debian.org/tracker/CVE-2020-22023
https://security-tracker.debian.org/tracker/CVE-2020-22025
https://security-tracker.debian.org/tracker/CVE-2020-22026
https://security-tracker.debian.org/tracker/CVE-2020-22028
https://security-tracker.debian.org/tracker/CVE-2020-22031
https://security-tracker.debian.org/tracker/CVE-2020-22032
https://security-tracker.debian.org/tracker/CVE-2020-22036
https://security-tracker.debian.org/tracker/CVE-2021-3566
Severity: High
ID: 152737
File Name: debian_DLA-2742.nasl
Version: 1.3
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 8/23/2021
Updated: 12/4/2023
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-22036
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.9
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:ffmpeg, p-cpe:/a:debian:debian_linux:ffmpeg-doc, p-cpe:/a:debian:debian_linux:libav-tools, p-cpe:/a:debian:debian_linux:libavcodec-dev, p-cpe:/a:debian:debian_linux:libavcodec-extra, p-cpe:/a:debian:debian_linux:libavcodec-extra57, p-cpe:/a:debian:debian_linux:libavcodec57, p-cpe:/a:debian:debian_linux:libavdevice-dev, p-cpe:/a:debian:debian_linux:libavdevice57, p-cpe:/a:debian:debian_linux:libavfilter-dev, p-cpe:/a:debian:debian_linux:libavfilter-extra, p-cpe:/a:debian:debian_linux:libavfilter-extra6, p-cpe:/a:debian:debian_linux:libavfilter6, p-cpe:/a:debian:debian_linux:libavformat-dev, p-cpe:/a:debian:debian_linux:libavformat57, p-cpe:/a:debian:debian_linux:libavresample-dev, p-cpe:/a:debian:debian_linux:libavresample3, p-cpe:/a:debian:debian_linux:libavutil-dev, p-cpe:/a:debian:debian_linux:libavutil55, p-cpe:/a:debian:debian_linux:libpostproc-dev, p-cpe:/a:debian:debian_linux:libpostproc54, p-cpe:/a:debian:debian_linux:libswresample-dev, p-cpe:/a:debian:debian_linux:libswresample2, p-cpe:/a:debian:debian_linux:libswscale-dev, p-cpe:/a:debian:debian_linux:libswscale4, cpe:/o:debian:debian_linux:9.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/14/2021
Vulnerability Publication Date: 5/24/2021
CVE: CVE-2020-21041, CVE-2020-22015, CVE-2020-22016, CVE-2020-22020, CVE-2020-22021, CVE-2020-22022, CVE-2020-22023, CVE-2020-22025, CVE-2020-22026, CVE-2020-22028, CVE-2020-22031, CVE-2020-22032, CVE-2020-22036, CVE-2021-3566, CVE-2021-38114