CVE-2022-3666

A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_LinearReader::Advance of the file Ap4LinearReader.cpp of the component mp42ts. The manipulation leads to use after free. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212006 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip Exploit Third Party Advisory
https://github.com/axiomatic-systems/Bento4/issues/793 Exploit Third Party Advisory
https://vuldb.com/?id.212006 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*

History

28 Oct 2022, 17:46

Type Values Removed Values Added
CWE CWE-119
CPE cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Axiosys bento4
Axiosys
References (MISC) https://github.com/axiomatic-systems/Bento4/issues/793 - (MISC) https://github.com/axiomatic-systems/Bento4/issues/793 - Exploit, Third Party Advisory
References (MISC) https://vuldb.com/?id.212006 - (MISC) https://vuldb.com/?id.212006 - Permissions Required, Third Party Advisory
References (MISC) https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip - (MISC) https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip - Exploit, Third Party Advisory

26 Oct 2022, 19:38

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-26 19:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-3666

Mitre link : CVE-2022-3666

CVE.ORG link : CVE-2022-3666


JSON object : View

Products Affected

axiosys

  • bento4
CWE
CWE-416

Use After Free

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer