
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical heap buffer overflow vulnerability was discovered in Axiomatic Bento4's mp4info functionality (CVE-2022-3974). The vulnerability exists in the ReadPartial function within Ap4StdCFileByteStream.cpp at line 341, affecting the latest master branch (5e7bb34). This vulnerability appears to be an incomplete fix of a previous issue (#510) (GitHub Issue).
The vulnerability is a heap buffer overflow that occurs during the parsing of MP4 files in the ReadPartial function. The issue manifests when processing certain MP4 file structures, specifically when reading metadata strings. The vulnerability can be triggered through the mp4info command-line tool when processing specially crafted MP4 files. The overflow occurs at memory address 0x602000000171, involving a WRITE operation of size 30 bytes beyond the allocated buffer region (GitHub Issue).
The vulnerability could lead to arbitrary code execution through memory manipulation, as users can control the content parsed by the program. When exploited, this could allow attackers to execute malicious code with the privileges of the application running the Bento4 library (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."