Skip to content

Instantly share code, notes, and snippets.

@G2FUZZ
Last active January 29, 2025 03:22
Show Gist options
  • Save G2FUZZ/91a1cc3b8f2b0720e984353d59023b24 to your computer and use it in GitHub Desktop.
Save G2FUZZ/91a1cc3b8f2b0720e984353d59023b24 to your computer and use it in GitHub Desktop.
Bug Report
1. CVE-2024-57509
(a) Suggested description: Buffer Overflow vulnerability in Bento4 mp42avc. Allow a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions
(b) Vulnerability Type: Buffer Overflow
(c) Vendor of Product: Bento4
(d) Affected Product Code Base: Affected product: mp42avc. The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35
(e) Attack Type: Local
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/989
2. CVE-2024-57510
(a) Suggested description: Buffer Overflow vulnerability in Bento4 mp42avc. Allow a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial
(b) Vulnerability Type: Buffer Overflow
(c) Vendor of Product: Bento4
(d) Affected Product Code Base: Affected product: mp42avc. The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35
(e) Attack Type: Local
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/989
3. CVE-2024-57513
(a) Suggested description: A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4.
(b) Vulnerability Type: Buffer Overflow
(c) Vendor of Product: Bento4
(d) Affected Product Code Base: Affected product: mp42hevc - The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35
(e) Attack Type: Local
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/990
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment