First published: Wed Feb 19 2025(Updated: )
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-25943 is considered high due to the potential for remote code execution.
To fix CVE-2025-25943, update Bento4 to version 1.6.0-642 or later as recommended by the vendor.
CVE-2025-25943 affects users of Bento4 version 1.6.0-641.
CVE-2025-25943 is classified as a buffer overflow vulnerability.
Yes, CVE-2025-25943 can be exploited by a local attacker to execute arbitrary code.