Axiomatic Bento4 mp4decrypt memory leak

A vulnerability, which was classified as problematic, was found in Axiomatic Bento4. Affected is an unknown function of the component mp4decrypt. The manipulation leads to memory leak. Using CWE to declare the problem leads to CWE-401. The weakness was disclosed 11/01/2022 as 792. The advisory is available at github.com. This vulnerability is traded as CVE-2022-3816. It is possible to launch the attack remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1499 by the MITRE ATT&CK project. It is declared as proof-of-concept. The exploit is shared for download at github.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

124

Field

exploit_price_0day2
source_cve_nvd_summary1
source_cve_assigned1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1

Commit Conf

90%32
50%10
70%2

Approve Conf

90%32
80%10
70%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1332773612/03/2022VulD...price_0day$0-$5ksee exploit price documentation12/03/2022accepted
90
1332773512/03/2022VulD...cve_nvd_summaryA vulnerability, which was classified as problematic, was found in Axiomatic Bento4. Affected is an unknown function of the component mp4decrypt. The manipulation leads to memory leak. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212682 is the identifier assigned to this vulnerability.cve.mitre.org12/03/2022accepted
70
1332773412/03/2022VulD...cve_assigned1667257200 (11/01/2022)cve.mitre.org12/03/2022accepted
70
1320865411/01/2022VulD...price_0day$0-$5ksee exploit price documentation11/01/2022accepted
90
1320865311/01/2022VulD...cvss3_meta_tempscore3.9see CVSS documentation11/01/2022accepted
90
1320865211/01/2022VulD...cvss3_meta_basescore4.3see CVSS documentation11/01/2022accepted
90
1320865111/01/2022VulD...cvss3_vuldb_tempscore3.9see CVSS documentation11/01/2022accepted
90
1320865011/01/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation11/01/2022accepted
90
1320864911/01/2022VulD...cvss2_vuldb_tempscore4.3see CVSS documentation11/01/2022accepted
90
1320864811/01/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation11/01/2022accepted
90
1320864711/01/2022VulD...cvss3_vuldb_rlXderived from historical data11/01/2022accepted
80
1320864611/01/2022VulD...cvss2_vuldb_rlNDderived from historical data11/01/2022accepted
80
1320864511/01/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector11/01/2022accepted
80
1320864411/01/2022VulD...cvss2_vuldb_ePOCderived from vuldb v3 vector11/01/2022accepted
80
1320864311/01/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector11/01/2022accepted
80
1320864211/01/2022VulD...cvss2_vuldb_iiNderived from vuldb v3 vector11/01/2022accepted
80
1320864111/01/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector11/01/2022accepted
80
1320864011/01/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector11/01/2022accepted
80
1320863911/01/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector11/01/2022accepted
80
1320863811/01/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector11/01/2022accepted
80

24 more entries are not shown

Want to stay up to date on a daily basis?

Enable the mail alert feature now!