Vulnerability Details : CVE-2021-30145
A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2021-30145
Probability of exploitation activity in the next 30 days: 1.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-30145
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-30145
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-30145
-
https://devel0pment.de/?p=2217
mpv media player – mf custom protocol vulnerability (CVE-2021-30145) – devel0pment.deExploit;Third Party Advisory
-
https://mpv.io
mpv.ioProduct;Vendor Advisory
-
https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6
demux_mf: improve format string processing · mpv-player/mpv@d0c5309 · GitHubPatch;Third Party Advisory
-
https://github.com/mpv-player/mpv/releases/tag/v0.33.1
Release v0.33.1 · mpv-player/mpv · GitHubThird Party Advisory
-
https://security.gentoo.org/glsa/202107-46
mpv: Format string vulnerability (GLSA 202107-46) — Gentoo securityThird Party Advisory
Products affected by CVE-2021-30145
- cpe:2.3:a:mpv:mpv:*:*:*:*:*:*:*:*