First published: Sat Oct 12 2019(Updated: )
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_PrintInspector::AddField in Core/Ap4Atom.cpp when called from AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp, when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bento4 | =1.5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17530 is considered to be a medium severity vulnerability due to the potential for a heap-based buffer over-read.
To fix CVE-2019-17530, users should upgrade to a patched version of Bento4 if available, or apply relevant security patches provided by the vendor.
CVE-2019-17530 is classified as a heap-based buffer over-read vulnerability.
CVE-2019-17530 specifically affects Bento4 version 1.5.1.0.
Yes, CVE-2019-17530 may be exploited by attackers through maliciously crafted input that can trigger the buffer over-read.