
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in Bento4 through version 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields (CVE Details).
The vulnerability is a global buffer overflow that occurs during file writing operations. The issue manifests when the WritePartial function attempts to perform a read operation of size 237 bytes at an invalid memory location, specifically at address 0x000000cfdb21. This location is 63 bytes to the left of a global variable 'AP4_GlobalOptions::g_Entries' and 0 bytes to the right of global variable 'AP4_String::EmptyString' (GitHub Issue).
The vulnerability can lead to a buffer over-read condition, which could potentially result in unauthorized access to memory contents or program crashes. This could affect the stability and security of applications using the Bento4 library for MP4 file processing (CVE Details).
Users should upgrade to a version of Bento4 that has patched this vulnerability. If upgrading is not immediately possible, careful validation of input files before processing them with the affected functions may help mitigate the risk (CVE Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."