
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue in AP4SgpdAtom::AP4SgpdAtom() of Bento4-1.6.0-639 allows attackers to cause a Denial of Service (DoS) via a crafted mp4 input. The vulnerability was discovered and reported in May 2022 (GitHub Issue).
The vulnerability exists in the AP4SgpdAtom::AP4SgpdAtom() function where a crafted input can set entry_count to a large value (4,278,190,081). This triggers a long loop that continuously allocates memory in the payload data structure and buffer operations, eventually exhausting the system's memory resources. The issue is exacerbated by the fact that the return value of stream.Read is not checked, preventing the loop from terminating at the end of the input file (GitHub Issue).
When successfully exploited, the vulnerability can cause a Denial of Service condition by exhausting system memory. In testing, the process was observed to exhaust 65536MB of memory before failing (GitHub Issue).
The vulnerability affects Bento4 version 1.6.0-639. Users should upgrade to a patched version of the software when available (Ubuntu CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."