{"id":"CVE-2023-51796","details":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/f_reverse.c:269:26 in areverse_request_frame.","modified":"2026-04-09T09:50:30.784025Z","published":"2024-04-19T17:15:52.407Z","related":["CGA-4pgf-5gfr-jxv8","openSUSE-SU-2024:13888-1"],"references":[{"type":"WEB","url":"https://ffmpeg.org/"},{"type":"REPORT","url":"https://trac.ffmpeg.org/ticket/10753"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ffmpeg/ffmpeg","events":[{"introduced":"0"},{"last_affected":"083443d67cb159ce469e5d902346b8d0c2cd1c93"},{"introduced":"0"},{"last_affected":"af25a4bfd2503caf3ee485b27b99b620302f5718"},{"introduced":"0"},{"last_affected":"e3a61e91030696348b56361bdf80ea358aef4a19"},{"introduced":"0"},{"last_affected":"eaddd1d7140bab19e5a4403d3c0f61fe5f59cb75"},{"introduced":"0"},{"last_affected":"6b213175c90534e0ad1924bfeba2cf7e20db5bf2"},{"introduced":"0"},{"last_affected":"6b213175c90534e0ad1924bfeba2cf7e20db5bf2"},{"introduced":"0"},{"last_affected":"db69d06eeeab4f46da15030a80d539efb4503ca8"},{"introduced":"0"},{"last_affected":"f893221c8d89cb798b829bebe71d55e1a3f242fd"},{"introduced":"0"},{"last_affected":"f46e514491172d15bd74b4abb1814cd2f05a763e"},{"introduced":"0"},{"last_affected":"38e224c2ba0958d84453f81548d9b245eecd82a1"},{"introduced":"0"},{"last_affected":"140fd653aed8cad774f991ba083e2d01e86420c7"},{"introduced":"0"},{"last_affected":"894da5ca7d742e4429ffb2af534fcda0103ef593"},{"introduced":"0"},{"last_affected":"638b521c7b09e00514aa13ade43c389b4b40ddfd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.1"},{"introduced":"0"},{"last_affected":"7.1-dev"},{"introduced":"0"},{"last_affected":"7.1.1"},{"introduced":"0"},{"last_affected":"7.1.2"},{"introduced":"0"},{"last_affected":"7.1.3"},{"introduced":"0"},{"last_affected":"7.2-dev"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"8.0.1"},{"introduced":"0"},{"last_affected":"8.1-dev"}]}}],"versions":["N","n0.11-dev","n0.12-dev","n0.8","n1.1-dev","n1.2-dev","n1.3-dev","n2.0","n2.1-dev","n2.2-dev","n2.3-dev","n2.4-dev","n2.5-dev","n2.6-dev","n2.7-dev","n2.8-dev","n2.9-dev","n3.1-dev","n3.2-dev","n3.3-dev","n3.4-dev","n3.5-dev","n4.1-dev","n4.2-dev","n4.3-dev","n4.4-dev","n4.5-dev","n5.1-dev","n5.2-dev","n6.1-dev","n6.2-dev","n7.0","n7.0.1","n7.0.2","n7.0.3","n7.1","n7.1-dev","n7.1.1","n7.1.2","n7.1.3","n7.2-dev","n8.0","n8.0.1","n8.1-dev"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"40"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-51796.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}]}