Axiomatic Bento4 avcinfo AvcInfo.cpp ବଫର୍ ଓଭରଫ୍ଲୋ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Axiomatic Bento4 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii AvcInfo.cpp keessa kutaa avcinfo keessa. Dhugumatti jijjiirraa gara ବଫର୍ ଓଭରଫ୍ଲୋ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-122 si geessa. Beekumsi kun yeroo 10/22/2022 ifoomsifameera akka 794. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2022-3665 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 65 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/22/2022 09:44 AM
ଅଦ୍ୟତନ 1/2
11/19/2022 02:13 PM
ଅଦ୍ୟତନ 2/2
11/19/2022 02:15 PM
software_vendorAxiomaticAxiomaticAxiomatic
software_nameBento4Bento4Bento4
software_componentavcinfoavcinfoavcinfo
software_fileAvcInfo.cppAvcInfo.cppAvcInfo.cpp
vulnerability_cweCWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_identifier794794794
advisory_urlhttps://github.com/axiomatic-systems/Bento4/issues/794https://github.com/axiomatic-systems/Bento4/issues/794https://github.com/axiomatic-systems/Bento4/issues/794
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.ziphttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.ziphttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
source_cveCVE-2022-3665CVE-2022-3665CVE-2022-3665
cna_responsibleVulDBVulDBVulDB
advisory_date1666389600 (10/22/2022)1666389600 (10/22/2022)1666389600 (10/22/2022)
software_typeMultimedia Player SoftwareMultimedia Player SoftwareMultimedia Player Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore6.46.46.4
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore6.66.66.6
cvss3_meta_basescore7.37.37.5
cvss3_meta_tempscore6.66.67.2
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1666389600 (10/22/2022)1666389600 (10/22/2022)
cve_nvd_summaryA vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore7.8
cvss3_cna_basescore7.3

Do you want to use VulDB in your project?

Use the official API to access entries easily!