Miggo Logo

CVE-2023-6602: A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration...

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.2684%
Published
12/31/2024
Updated
12/31/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided information describes a vulnerability in FFmpeg's TTY Demuxer when parsing HLS playlists. The Bugzilla report (https://bugzilla.redhat.com/show_bug.cgi?id=2334338) explains that the TTY demuxer can be forced to process non-TTY compliant input, leading to data exfiltration. Specifically, it mentions that even if an initial segment with a non-multimedia extension (like .ans) is blocked, subsequent segments in the HLS playlist (e.g., file:/// URIs) can still be processed by the TTY demuxer. This indicates that functions within the TTY demuxer responsible for input processing and rendering, as well as functions in the HLS demuxer responsible for segment parsing and demuxer selection, are involved. However, without the specific commit that patches this vulnerability, it's not possible to identify the exact function names, file paths, or provide direct patch evidence. The Bugzilla report mentions an upstream commit that enforces file extension checks in HLS playlists, but the commit URL is not provided. Therefore, I cannot confidently identify the vulnerable functions with the required level of precision and evidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in **mp**'s TTY **mux*r. T*is vuln*r**ility *llows possi*l* **t* *x*iltr*tion vi* improp*r p*rsin* o* non-TTY-*ompli*nt input *il*s in *LS pl*ylists.

Reasoning

T** provi*** in*orm*tion **s*ri**s * vuln*r**ility in **mp**'s TTY **mux*r w**n p*rsin* *LS pl*ylists. T** *u*zill* r*port (*ttps://*u*zill*.r****t.*om/s*ow_*u*.**i?i*=*******) *xpl*ins t**t t** TTY **mux*r **n ** *or*** to pro**ss non-TTY *ompli*nt