SB2017091109 - Multiple vulnerabilities in axiomatic-systems Bento4
Published: September 11, 2017 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2017-14257)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the SDK in Bento4 1.5.0-616, AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.
2) Buffer overflow (CVE-ID: CVE-2017-14258)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the SDK in Bento4 1.5.0-616, SetItemCount in Core/Ap4StscAtom.h file contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.
3) Buffer overflow (CVE-ID: CVE-2017-14259)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the SDK in Bento4 1.5.0-616, the AP4_StscAtom class in Ap4StscAtom.cpp contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.
4) Buffer overflow (CVE-ID: CVE-2017-14260)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the SDK in Bento4 1.5.0-616, the AP4_StssAtom class in Ap4StssAtom.cpp contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.
5) Buffer overflow (CVE-ID: CVE-2017-14261)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.
Remediation
Install update from vendor's website.