A vulnerability was found in Axiomatic Bento4 up to 1.6.0-641. It has been rated as critical. Affected by this issue is the function AP4_DataBuffer::GetData in the library Ap4DataBuffer.h. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
History

Fri, 28 Feb 2025 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Axiosys
Axiosys bento4
Weaknesses CWE-787
CPEs cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*
Vendors & Products Axiosys
Axiosys bento4

Thu, 30 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Axiomatic Bento4 up to 1.6.0-641. It has been rated as critical. Affected by this issue is the function AP4_DataBuffer::GetData in the library Ap4DataBuffer.h. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
Title Axiomatic Bento4 Ap4DataBuffer.h GetData heap-based overflow
Weaknesses CWE-119
CWE-122
References
Metrics cvssV2_0

{'score': 5.1, 'vector': 'AV:N/AC:H/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 5.6, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-01-30T13:00:20.408Z

Updated: 2025-01-30T14:56:00.294Z

Reserved: 2025-01-30T08:43:54.297Z

Link: CVE-2025-0870

cve-icon Vulnrichment

Updated: 2025-01-30T14:54:59.196Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-30T13:15:10.483

Modified: 2025-02-28T22:16:37.477

Link: CVE-2025-0870

cve-icon Redhat

No data.