Axiomatic Bento4 mp42hevc WriteSample heap-based overflow

A vulnerability was found in Axiomatic Bento4. It has been classified as critical. Affected is the function WriteSample of the component mp42hevc. The manipulation leads to heap-based buffer overflow. Using CWE to declare the problem leads to CWE-122. The weakness was published 10/22/2022 as 776. The advisory is available at github.com. This vulnerability is traded as CVE-2022-3670. It is possible to launch the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. It is declared as proof-of-concept. The exploit is shared for download at github.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Field10/22/2022 03:09 PM10/22/2022 03:10 PM11/19/2022 02:29 PM
vendorAxiomaticAxiomaticAxiomatic
nameBento4Bento4Bento4
componentmp42hevcmp42hevcmp42hevc
functionWriteSampleWriteSampleWriteSample
cwe122 (heap-based overflow)122 (heap-based overflow)122 (heap-based overflow)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
identifier776776776
urlhttps://github.com/axiomatic-systems/Bento4/issues/776https://github.com/axiomatic-systems/Bento4/issues/776https://github.com/axiomatic-systems/Bento4/issues/776
availability111
publicity111
urlhttps://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.ziphttps://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.ziphttps://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
cveCVE-2022-3670CVE-2022-3670CVE-2022-3670
responsibleVulDBVulDBVulDB
date1666389600 (10/22/2022)1666389600 (10/22/2022)1666389600 (10/22/2022)
typeMultimedia Player SoftwareMultimedia Player SoftwareMultimedia Player Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore6.46.46.4
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore6.66.66.6
cvss3_meta_basescore7.37.37.3
cvss3_meta_tempscore6.66.66.6
price_0day$0-$5k$0-$5k$0-$5k
version
cve_assigned1666389600 (10/22/2022)
cve_nvd_summaryA vulnerability was found in Axiomatic Bento4. It has been classified as critical. Affected is the function WriteSample of the component mp42hevc. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212010 is the identifier assigned to this vulnerability.

Do you want to use VulDB in your project?

Use the official API to access entries easily!