CVE-2022-3667

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3667
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3667.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3667
Related
Published
2022-10-26T19:15:24Z
Modified
2024-08-01T06:57:00.047460Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.

References

Affected packages

Git / github.com/axiomatic-systems/bento4

Affected ranges

Type
GIT
Repo
https://github.com/axiomatic-systems/bento4
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v1.*

v1.4.2-584
v1.4.2-586
v1.4.2-587
v1.4.2-588
v1.4.2-589
v1.4.2-590
v1.4.2-591
v1.4.2-592
v1.4.2-593
v1.4.2-594
v1.4.3-595
v1.4.3-596
v1.4.3-597
v1.4.3-598
v1.4.3-599
v1.4.3-600
v1.4.3-601
v1.4.3-602
v1.4.3-603
v1.4.3-604
v1.4.3-605
v1.4.3-606
v1.4.3-607
v1.4.3-608
v1.5.0-609
v1.5.0-610
v1.5.0-611
v1.5.0-612
v1.5.0-613
v1.5.0-614
v1.5.0-615
v1.5.0-616
v1.5.0-617
v1.5.0-618
v1.5.0-619
v1.5.1-620
v1.5.1-621
v1.5.1-622
v1.5.1-623
v1.5.1-624
v1.5.1-626
v1.5.1-627
v1.5.1-628
v1.5.1-629
v1.5.1-630
v1.6.0-635
v1.6.0-636
v1.6.0-637
v1.6.0-638
v1.6.0-639