First published: Wed Feb 19 2025(Updated: )
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25944 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2025-25944, you should update to a patched version of Bento4 that addresses this buffer overflow issue.
CVE-2025-25944 affects users of Bento4 versions prior to the fix release that addresses this buffer overflow vulnerability.
Exploitation of CVE-2025-25944 could allow an attacker to execute arbitrary code on the affected system.
Currently, there are no effective workarounds for CVE-2025-25944, and the best measure is to promptly update to the latest version.