Axiomatic Bento4 avcinfo AvcInfo.cpp Korupcija memorije

Pronađena je ranjivost klasifikovana kao Kritične u Axiomatic Bento4. Zahvaćeno je nepoznata funkcija u fajlu AvcInfo.cpp u komponenti avcinfo. Izmena rezultira Korupcija memorije. Upotreba CWE za identifikaciju problema vodi ka CWE-122. Ova slabost je objavljena 10/22/2022 kao 794. Izveštaj je podeljen za preuzimanje na github.com. Ova bezbednosna slabost se vodi pod oznakom CVE-2022-3665. Postoji mogućnost pokretanja napada sa udaljene lokacije. Napad se mora sprovesti u okviru lokalne mreže. Tehničke informacije su dostupne. Поред тога, експлоит је доступан. Eksploit je objavljen javnosti i može se koristiti. Trenutno je cena za eksploataciju približno USD $0-$5k u ovom momentu. Proglašeno je za dokaz-of-koncept. Ekspoit je podeljen za preuzimanje na github.com. Kao 0-day, procenjena podzemna cena iznosila je oko $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 Promene · 65 Tačke podataka

PoljeKreirali
10/22/2022 09:44
Ažurira 1/2
11/19/2022 14:13
Ažurira 2/2
11/19/2022 14:15
software_vendorAxiomaticAxiomaticAxiomatic
software_nameBento4Bento4Bento4
software_componentavcinfoavcinfoavcinfo
software_fileAvcInfo.cppAvcInfo.cppAvcInfo.cpp
vulnerability_cweCWE-122 (Korupcija memorije)CWE-122 (Korupcija memorije)CWE-122 (Korupcija memorije)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_identifier794794794
advisory_urlhttps://github.com/axiomatic-systems/Bento4/issues/794https://github.com/axiomatic-systems/Bento4/issues/794https://github.com/axiomatic-systems/Bento4/issues/794
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.ziphttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.ziphttps://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
source_cveCVE-2022-3665CVE-2022-3665CVE-2022-3665
cna_responsibleVulDBVulDBVulDB
advisory_date1666389600 (10/22/2022)1666389600 (10/22/2022)1666389600 (10/22/2022)
software_typeMultimedia Player SoftwareMultimedia Player SoftwareMultimedia Player Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore6.46.46.4
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore6.66.66.6
cvss3_meta_basescore7.37.37.5
cvss3_meta_tempscore6.66.67.2
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1666389600 (10/22/2022)1666389600 (10/22/2022)
cve_nvd_summaryA vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore7.8
cvss3_cna_basescore7.3

Do you want to use VulDB in your project?

Use the official API to access entries easily!