Vulnerability Description
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Axiosys | Bento4 | 1.5.0-617 |
Related Weaknesses (CWE)
References
- https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4ExploitIssue TrackingPatch
- https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a4PatchThird Party Advisory
- https://github.com/axiomatic-systems/Bento4/issues/188ExploitThird Party Advisory
- https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4ExploitIssue TrackingPatch
- https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a4PatchThird Party Advisory
- https://github.com/axiomatic-systems/Bento4/issues/188ExploitThird Party Advisory
FAQ
What is CVE-2017-14646?
CVE-2017-14646 is a vulnerability with a CVSS score of 7.5 (HIGH). The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in ...
How severe is CVE-2017-14646?
CVE-2017-14646 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14646?
Check the references section above for vendor advisories and patch information. Affected products include: Axiosys Bento4.