An issue was discovered in rust-ffmpeg 0.3.0 (after comit 5ac0527) Integer overflow and invalid input vulnerability in the cached method allows an attacker to cause a denial of service or potentially execute arbitrary code. The vulnerability occurs when dimension parameters are zero or exceed i32::MAX, leading to an unchecked cast that violates the underlying C function's preconditions and triggers undefined behavior.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/meh/rust-ffmpeg/issues/192 |
![]() ![]() |
History
Tue, 02 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in rust-ffmpeg 0.3.0 (after comit 5ac0527) Integer overflow and invalid input vulnerability in the cached method allows an attacker to cause a denial of service or potentially execute arbitrary code. The vulnerability occurs when dimension parameters are zero or exceed i32::MAX, leading to an unchecked cast that violates the underlying C function's preconditions and triggers undefined behavior. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-02T15:58:51.870Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57614

No data.

Status : Received
Published: 2025-09-02T16:15:40.270
Modified: 2025-09-02T16:15:40.270
Link: CVE-2025-57614

No data.

No data.