First published: Thu Sep 21 2017(Updated: )
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bento4 | =1.5.0-617 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14646 is considered a high severity vulnerability due to its potential for causing application crashes.
To fix CVE-2017-14646, upgrade Bento4 to version 1.5.0-618 or later, which includes the necessary patches.
CVE-2017-14646 can be exploited through specially crafted files that trigger the heap-based buffer over-read.
CVE-2017-14646 affects Bento4 version 1.5.0-617.
If not addressed, CVE-2017-14646 may lead to application instability and crashes, affecting user experience and data integrity.