
Cloud Vulnerability DB
A community-led vulnerabilities database
The MPlayer Project products were found to be vulnerable to a Buffer Overflow vulnerability (CVE-2022-38863) in the mpgetbits() function of libmpdemux/mpeghdr.c, affecting both mencoder and mplayer applications. The vulnerability specifically impacts mencoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1 versions (NVD, CVE).
The vulnerability is a heap-buffer-overflow that occurs in the mpgetbits() function within libmpdemux/mpeghdr.c. The issue manifests during the processing of media files and can be triggered through specific input files. The vulnerability has a CVSS 3.1 Base Score of 5.5 (Medium), with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (Ubuntu).
The vulnerability primarily affects the availability of the system, with no direct impact on confidentiality or integrity. When successfully exploited, it can cause the application to crash, potentially leading to a denial of service condition (Ubuntu).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has fixed the issue across multiple versions: 22.10 (2:1.4+ds1-3ubuntu1.1), 22.04 LTS (2:1.4+ds1-3ubuntu0.1), 20.04 LTS (2:1.3.0-8+deb10u1build0.20.04.1), and 18.04 LTS (2:1.3.0-7ubuntu0.2). Debian has also addressed the vulnerability in version 2:1.3.0-8+deb10u1 (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."