
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3666 is a heap-use-after-free vulnerability discovered in the AP4_LinearReader::Advance function within the mp42ts component of Bento4. The vulnerability was identified and reported on October 10, 2022, affecting the Bento4 master branch (commit 4df7274e) and version 1.6.0-639 (GitHub Issue).
The vulnerability occurs in the AP4_LinearReader::Advance(bool) function located in Bento4/Source/C++/Core/Ap4LinearReader.cpp at line 434. When triggered, it results in a READ operation of size 8 at a previously freed memory location (0x604000001f98). The issue stems from accessing a 48-byte region of memory after it has been freed, specifically 8 bytes into the freed region (GitHub Issue).
This heap-use-after-free vulnerability could potentially lead to memory corruption, program crashes, or potential code execution. The issue affects the mp42ts component, which could impact applications using this functionality for media processing (GitHub Issue).
The vulnerability was identified in Bento4 version 1.6.0-639. Users should update to a patched version once available. The issue can be reproduced using Address Sanitizer (ASAN) with specific compiler flags: -fsanitize=address (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."