
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability was discovered in the avcinfo tool of Bento4, identified as CVE-2022-3665. The vulnerability was reported on October 10, 2022, affecting the Bento4 master branch and version 1.6.0-639 (GitHub Issue).
Two distinct heap buffer overflow bugs were identified in the avcinfo tool. The first bug involves a READ operation of size 8 at address 0x602000000038, occurring in the AP4_BitStream::WriteBytes function. The second bug manifests as a READ operation of size 1 at address 0x602000000011 in the main function. Both vulnerabilities are triggered through improper buffer handling in the AP4_DataBuffer::ReallocateBuffer function (GitHub Issue).
The heap buffer overflow vulnerabilities could potentially lead to memory corruption, program crashes, and in some cases, arbitrary code execution. The bugs specifically affect the avcinfo tool's ability to properly handle certain input files, potentially compromising the security of systems using this component (GitHub Issue).
Users are recommended to update to the latest version of Bento4 that contains the fix for these vulnerabilities. For developers working with the source code, the issues can be reproduced and verified using clang compiler version 10.01 with Address Sanitizer enabled (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."