In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.
References
Link | Resource |
---|---|
https://github.com/axiomatic-systems/Bento4/issues/181 | Exploit Third Party Advisory |
https://github.com/axiomatic-systems/Bento4/issues/181 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/axiomatic-systems/Bento4/issues/181 - Exploit, Third Party Advisory |
Information
Published : 2017-09-11 09:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14261
Mitre link : CVE-2017-14261
CVE.ORG link : CVE-2017-14261
JSON object : View
Products Affected
bento4
- bento4
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer