Vulnerability Description
The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE in Core/Ap4Utils.h.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bento4 | Bento4 | 1.5.0-617 |
Related Weaknesses (CWE)
References
- https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4ExploitIssue TrackingPatch
- https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ecPatchThird Party Advisory
- https://github.com/axiomatic-systems/Bento4/issues/187ExploitThird Party Advisory
- https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4ExploitIssue TrackingPatch
- https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ecPatchThird Party Advisory
- https://github.com/axiomatic-systems/Bento4/issues/187ExploitThird Party Advisory
FAQ
What is CVE-2017-14643?
CVE-2017-14643 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE ...
How severe is CVE-2017-14643?
CVE-2017-14643 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14643?
Check the references section above for vendor advisories and patch information. Affected products include: Bento4 Bento4.