Axiomatic Bento4 mp4info Ap4StdCFileByteStream.cpp ReadPartial 内存损坏

Axiomatic Bento4中曾发现分类为致命的漏洞。 受此漏洞影响的是功能AP4_StdcFileByteStream::ReadPartial文件:Ap4StdCFileByteStream.cpp的组件mp4info。 手动调试的不合法输入可导致 内存损坏。 漏洞的CWE定义是 CWE-122。 此漏洞的脆弱性 2022-11-13公示人身份812、所提交。 分享公告的网址是github.com。 该漏洞被称作为CVE-2022-3974, 攻击可能起始于远程, 有技术细节可用。 此外还有一个漏洞可利用。 该漏洞利用已公开,可能会被利用。 当前漏洞利用价值为美元大约是 $0-$5k。 它被宣布为proof-of-concept。 可以在github.com下载该漏洞利用。 我们估计的零日攻击价值约为$0-$5k。 该漏洞被披露后,此前未曾发表过可能的缓解措施。

字段2022-11-13 09時36分2022-12-17 15時03分
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.75.7
price_0day$0-$5k$0-$5k
vendorAxiomaticAxiomatic
nameBento4Bento4
componentmp4infomp4info
fileAp4StdCFileByteStream.cppAp4StdCFileByteStream.cpp
functionAP4_StdcFileByteStream::ReadPartialAP4_StdcFileByteStream::ReadPartial
cwe122 (内存损坏)122 (内存损坏)
risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiRR
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
urlhttps://github.com/axiomatic-systems/Bento4/issues/812https://github.com/axiomatic-systems/Bento4/issues/812
availability11
publicity11
urlhttps://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.ziphttps://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip
cveCVE-2022-3974CVE-2022-3974
responsibleVulDBVulDB
date1668294000 (2022-11-13)1668294000 (2022-11-13)
typeMultimedia Player SoftwareMultimedia Player Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss2_vuldb_basescore7.57.5
cvss2_vuldb_tempscore6.46.4
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
identifier812
cve_assigned1668294000 (2022-11-13)
cve_nvd_summaryA vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is the function AP4_StdcFileByteStream::ReadPartial of the file Ap4StdCFileByteStream.cpp of the component mp4info. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213553 was assigned to this vulnerability.

Might our Artificial Intelligence support you?

Check our Alexa App!