Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25473: n/a

0
Medium
VulnerabilityCVE-2025-25473cvecve-2025-25473
Published: Tue Feb 18 2025 (02/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FFmpeg git master before commit c08d30 was discovered to contain a memory leak in the avformat_free_context function in libavutil/mem.c.

AI-Powered Analysis

AILast updated: 12/16/2025, 19:10:53 UTC

Technical Analysis

CVE-2025-25473 identifies a memory leak vulnerability in the FFmpeg open-source multimedia framework, specifically within the avformat_free_context function located in libavutil/mem.c. This flaw exists in FFmpeg git master versions prior to commit c08d30. The memory leak occurs when the function responsible for freeing format context structures fails to release allocated memory properly, leading to gradual memory consumption over time. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating improper memory handling. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), the vulnerability can be exploited remotely without authentication or user interaction, affecting the integrity of the system by potentially causing corrupted or inconsistent memory states, but it does not impact confidentiality or availability directly. No known exploits have been reported in the wild as of the publication date (February 18, 2025). This vulnerability is relevant to any system or application using vulnerable FFmpeg versions for media processing, streaming, or transcoding, which are common in multimedia platforms, broadcasting, and content delivery networks. The memory leak could lead to resource exhaustion, degraded performance, or crashes if exploited over time, especially in high-load environments.

Potential Impact

For European organizations, the impact of CVE-2025-25473 primarily involves potential degradation of system integrity and performance due to memory leaks in FFmpeg-based applications. This can result in increased memory consumption leading to slowdowns, application instability, or crashes, which may disrupt media processing workflows, streaming services, or broadcast operations. Organizations relying heavily on FFmpeg for video encoding, live streaming, or content delivery could experience service interruptions or increased operational costs due to resource exhaustion. While no direct confidentiality or availability compromise is indicated, prolonged exploitation could indirectly affect availability through system instability. The impact is more pronounced in environments with continuous or high-volume media processing. European media companies, broadcasters, and cloud service providers integrating FFmpeg are at risk, potentially affecting service quality and reliability. Additionally, the vulnerability could be leveraged as part of a broader attack chain to degrade system performance or evade detection by causing instability.

Mitigation Recommendations

To mitigate CVE-2025-25473, European organizations should: 1) Update FFmpeg to the latest version that includes the fix for the memory leak, specifically versions incorporating or after commit c08d30. 2) If immediate update is not feasible, apply any available patches or backported fixes from trusted sources. 3) Monitor memory usage of FFmpeg processes closely in production environments to detect abnormal increases indicative of exploitation. 4) Implement resource limits (e.g., cgroups on Linux) to contain potential memory leaks and prevent system-wide impact. 5) Conduct regular audits of multimedia processing pipelines to ensure usage of secure FFmpeg builds. 6) Employ runtime application self-protection (RASP) or endpoint detection tools to identify anomalous behavior related to memory consumption. 7) Educate development and operations teams about the vulnerability and encourage prompt patch management. 8) For cloud or containerized deployments, rebuild images with updated FFmpeg versions and redeploy to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941ae5b0d5f6f4391b0c39e

Added to database: 12/16/2025, 7:09:15 PM

Last enriched: 12/16/2025, 7:10:53 PM

Last updated: 12/17/2025, 2:39:50 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats