Last active
January 29, 2025 03:22
-
-
Save G2FUZZ/91a1cc3b8f2b0720e984353d59023b24 to your computer and use it in GitHub Desktop.
Bug Report
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. CVE-2024-57509 | |
(a) Suggested description: Buffer Overflow vulnerability in Bento4 mp42avc. Allow a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions | |
(b) Vulnerability Type: Buffer Overflow | |
(c) Vendor of Product: Bento4 | |
(d) Affected Product Code Base: Affected product: mp42avc. The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35 | |
(e) Attack Type: Local | |
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/989 | |
2. CVE-2024-57510 | |
(a) Suggested description: Buffer Overflow vulnerability in Bento4 mp42avc. Allow a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial | |
(b) Vulnerability Type: Buffer Overflow | |
(c) Vendor of Product: Bento4 | |
(d) Affected Product Code Base: Affected product: mp42avc. The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35 | |
(e) Attack Type: Local | |
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/989 | |
3. CVE-2024-57513 | |
(a) Suggested description: A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4. | |
(b) Vulnerability Type: Buffer Overflow | |
(c) Vendor of Product: Bento4 | |
(d) Affected Product Code Base: Affected product: mp42hevc - The related commit of Bento4 is 3bdc891602d19789b8e8626e4a3e613a937b4d35 | |
(e) Attack Type: Local | |
(f) Attack Vectors: Details can be seen in https: https://github.com/axiomatic-systems/Bento4/issues/990 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment