Vulnerability Description
A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mpv | Mpv | <= 0.33.0 |
Related Weaknesses (CWE)
References
- https://devel0pment.de/?p=2217ExploitThird Party Advisory
- https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34ePatchThird Party Advisory
- https://github.com/mpv-player/mpv/releases/tag/v0.33.1Third Party Advisory
- https://mpv.ioProductVendor Advisory
- https://security.gentoo.org/glsa/202107-46Third Party Advisory
- https://devel0pment.de/?p=2217ExploitThird Party Advisory
- https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34ePatchThird Party Advisory
- https://github.com/mpv-player/mpv/releases/tag/v0.33.1Third Party Advisory
- https://mpv.ioProductVendor Advisory
- https://security.gentoo.org/glsa/202107-46Third Party Advisory
FAQ
What is CVE-2021-30145?
CVE-2021-30145 is a vulnerability with a CVSS score of 7.8 (HIGH). A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
How severe is CVE-2021-30145?
CVE-2021-30145 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-30145?
Check the references section above for vendor advisories and patch information. Affected products include: Mpv Mpv.