CVE-2026-2889

Source
https://cve.org/CVERecord?id=CVE-2026-2889
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2889.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2889
Downstream
Published
2026-02-21T22:15:59.353Z
Modified
2026-02-26T00:38:03.984609Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component.

References

Affected packages

Git / github.com/ccextractor/ccextractor

Affected ranges

Type
GIT
Repo
https://github.com/ccextractor/ccextractor
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.70
v0.71
v0.72
v0.73
v0.74
v0.75
v0.76
v0.77
v0.78
v0.79
v0.80
v0.81
v0.82
v0.83
v0.84
v0.85
v0.85b
v0.86
v0.87
v0.88
v0.89
v0.90
v0.91
v0.92
v0.93
v0.94
v0.96
v0.96.1
v0.96.2
v0.96.3
v0.96.4
v0.96.5

Database specific

vanir_signatures
[
    {
        "id": "CVE-2026-2889-2da52f3c",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925",
        "target": {
            "file": "src/lib_ccx/mp4.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "268084206463964796024015378500305838941",
                "254774608404346571179725158523098331095",
                "181555103938976803185625693980704197134",
                "13895809837220784386125091335733592582"
            ]
        },
        "signature_type": "Line"
    },
    {
        "id": "CVE-2026-2889-3dcf91e3",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925",
        "target": {
            "function": "parse_PMT",
            "file": "src/lib_ccx/ts_tables.c"
        },
        "digest": {
            "length": 9778.0,
            "function_hash": "168783320918762457692703000749359075553"
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2026-2889-6643399d",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925",
        "target": {
            "function": "processmp4",
            "file": "src/lib_ccx/mp4.c"
        },
        "digest": {
            "length": 9048.0,
            "function_hash": "319390203887814197306087676168967181488"
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2026-2889-a9c8aa4a",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925",
        "target": {
            "function": "parse_PAT",
            "file": "src/lib_ccx/ts_tables.c"
        },
        "digest": {
            "length": 3574.0,
            "function_hash": "163437826467338751066847268261177864261"
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2026-2889-bb458d24",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/ccextractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925",
        "target": {
            "file": "src/lib_ccx/ts_tables.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "262233263044280559635643805212158708491",
                "186397457794567455341493973677993329934",
                "144833588488660765080911707542795417449",
                "222701608767875312846042142437623115307",
                "72091544595478024960231427334144362229",
                "274910035117258086469502219878236509258",
                "98069193800936354371588285816871594953",
                "287258658584949710030799267683252424354",
                "322249709969136488743348381363505130157",
                "133971348316274134195358327798707233385",
                "192690021554753830910145047033638215929",
                "165996735762037891307360703542698719073",
                "20631365143687003979010250023609770440",
                "299941716532484618942222197046988800391",
                "140964611875614036063826884500367932259",
                "216120134842979986078832162294962308555"
            ]
        },
        "signature_type": "Line"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2889.json"