Axiomatic Bento4 Avcinfo SetDataSize Pufferüberlauf

Hakika vulnerability da aka rarraba a matsayin kura an gano a Axiomatic Bento4. Tabbas, aikin AP4_DataBuffer::SetDataSize ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi Avcinfo. Wuro manipulation ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-122. Lalle, rauni an sanar da shi 10/31/2022 da 780. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2022-3785. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

3 Goyarwa · 66 Datenpunkte

FurɗeSúgá
10/31/2022 21:36
Gargadi 1/2
11/30/2022 08:29
Gargadi 2/2
11/30/2022 08:34
software_vendorAxiomaticAxiomaticAxiomatic
software_nameBento4Bento4Bento4
software_componentAvcinfoAvcinfoAvcinfo
software_functionAP4_DataBuffer::SetDataSizeAP4_DataBuffer::SetDataSizeAP4_DataBuffer::SetDataSize
vulnerability_cweCWE-122 (Pufferüberlauf)CWE-122 (Pufferüberlauf)CWE-122 (Pufferüberlauf)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/axiomatic-systems/Bento4/issues/780https://github.com/axiomatic-systems/Bento4/issues/780https://github.com/axiomatic-systems/Bento4/issues/780
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.ziphttps://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.ziphttps://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
source_cveCVE-2022-3785CVE-2022-3785CVE-2022-3785
cna_responsibleVulDBVulDBVulDB
advisory_date1667170800 (10/31/2022)1667170800 (10/31/2022)1667170800 (10/31/2022)
software_typeMultimedia Player SoftwareMultimedia Player SoftwareMultimedia Player Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore6.46.46.4
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.75.75.7
cvss3_meta_basescore6.36.36.8
cvss3_meta_tempscore5.75.76.6
price_0day$0-$5k$0-$5k$0-$5k
advisory_identifier780780
cve_assigned1667170800 (10/31/2022)1667170800 (10/31/2022)
cve_nvd_summaryA vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore7.8
cvss3_cna_basescore6.3

Interested in the pricing of exploits?

See the underground prices here!