A vulnerability was identified in CCExtractor up to 183. This affects the function parsePAT/parsePMT in the library src/libccx/tstables.c of the component MPEG-TS File Parser. Such manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The name of the patch is fd7271bae238ccb3ae8a71304ea64f0886324925. It is best practice to apply a patch to resolve this issue.
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2026-2245-2da52f3c",
"target": {
"file": "src/lib_ccx/mp4.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"268084206463964796024015378500305838941",
"254774608404346571179725158523098331095",
"181555103938976803185625693980704197134",
"13895809837220784386125091335733592582"
]
},
"signature_version": "v1",
"source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2026-2245-3dcf91e3",
"target": {
"file": "src/lib_ccx/ts_tables.c",
"function": "parse_PMT"
},
"digest": {
"length": 9778.0,
"function_hash": "168783320918762457692703000749359075553"
},
"signature_version": "v1",
"source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2026-2245-6643399d",
"target": {
"file": "src/lib_ccx/mp4.c",
"function": "processmp4"
},
"digest": {
"length": 9048.0,
"function_hash": "319390203887814197306087676168967181488"
},
"signature_version": "v1",
"source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2026-2245-a9c8aa4a",
"target": {
"file": "src/lib_ccx/ts_tables.c",
"function": "parse_PAT"
},
"digest": {
"length": 3574.0,
"function_hash": "163437826467338751066847268261177864261"
},
"signature_version": "v1",
"source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2026-2245-bb458d24",
"target": {
"file": "src/lib_ccx/ts_tables.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"262233263044280559635643805212158708491",
"186397457794567455341493973677993329934",
"144833588488660765080911707542795417449",
"222701608767875312846042142437623115307",
"72091544595478024960231427334144362229",
"274910035117258086469502219878236509258",
"98069193800936354371588285816871594953",
"287258658584949710030799267683252424354",
"322249709969136488743348381363505130157",
"133971348316274134195358327798707233385",
"192690021554753830910145047033638215929",
"165996735762037891307360703542698719073",
"20631365143687003979010250023609770440",
"299941716532484618942222197046988800391",
"140964611875614036063826884500367932259",
"216120134842979986078832162294962308555"
]
},
"signature_version": "v1",
"source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2245.json"