
Cloud Vulnerability DB
A community-led vulnerabilities database
Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file. The vulnerability was discovered and reported on September 7, 2022 (GitHub Issue).
The vulnerability exists in the AP4_MemoryByteStream::WritePartial function within the Bento4 library's mp42aac component. When processing certain crafted files, the function attempts to perform a write operation of size 4294967288 bytes, leading to a heap-buffer-overflow. This was confirmed through testing with AddressSanitizer (ASAN) instrumentation. The CVSS v3.1 base score is 6.5 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) (NVD).
The successful exploitation of this vulnerability can lead to denial of service conditions in applications using the affected Bento4 library. The impact is primarily focused on availability, with no direct impact on confidentiality or integrity (NVD).
Users should upgrade to a version newer than Bento4 v1.6.0-639. If upgrading is not immediately possible, users should exercise caution when processing untrusted input files through the mp42aac utility (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."