{"id":"CVE-2022-3965","summary":"ffmpeg QuickTime Graphics Video Encoder smcenc.c smc_encode_stream out-of-bounds","details":"A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.","modified":"2026-05-18T05:54:00.264044540Z","published":"2022-11-13T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3965.json","cwe_ids":["CWE-119"],"cna_assigner":"VulDB"},"references":[{"type":"WEB","url":"https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/13c13109759090b7f7182480d075e13b36ed8edd"},{"type":"WEB","url":"https://vuldb.com/?id.213544"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3965.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3965"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202312-14"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.ffmpeg.org/ffmpeg.git","events":[{"introduced":"390d6853d0ef408007feb39c0040682c81c02751"},{"fixed":"0e15444aceca0e78f99f3d67758eb79d11b86599"},{"introduced":"b189550137155a622f88df6e64e72c2cca660854"},{"fixed":"963937e408fc68b5925f938a253cfff1d506f784"},{"fixed":"13c13109759090b7f7182480d075e13b36ed8edd"}],"database_specific":{"cpe":"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"5.0"},{"fixed":"5.0.3"},{"introduced":"5.1"},{"fixed":"5.1.3"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["n5.0.2","n5.1.2","n5.1.1","n5.1","n5.2-dev","n5.0.1","n5.0","n5.1-dev"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3965.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/ffmpeg/ffmpeg","events":[{"introduced":"390d6853d0ef408007feb39c0040682c81c02751"},{"fixed":"0e15444aceca0e78f99f3d67758eb79d11b86599"},{"introduced":"b189550137155a622f88df6e64e72c2cca660854"},{"fixed":"963937e408fc68b5925f938a253cfff1d506f784"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.0"},{"fixed":"5.0.3"},{"introduced":"5.1"},{"fixed":"5.1.3"}],"cpe":"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"}}],"versions":["n5.0.2","n5.1.2","n5.1.1","n5.1","n5.0.1","n5.0","n5.1-dev"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3965.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}]}