2020-23333 | Bento4 Ap4Utils.h AP4_CttsAtom heap-based overflow
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
3.5 | $0-$5k | 0.37 |
A vulnerability was found in Bento4 06c39d9 (Multimedia Player Software) and classified as problematic. This issue affects the function AP4_CttsAtom::AP4_CttsAtom
of the file /Core/Ap4Utils.h. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-122. Impacted is availability. The summary by CVE is:
A heap-based buffer overflow exists in the AP4_CttsAtom::AP4_CttsAtom component located in /Core/Ap4Utils.h of Bento4 version 06c39d9. This can lead to a denial of service (DOS).
The weakness was shared 08/18/2021. The advisory is shared at github.com. The identification of this vulnerability is CVE-2020-23333 since 08/13/2020. The exploitation is known to be easy. The attack can only be done within the local network. The successful exploitation needs a simple authentication. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/19/2021).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Type
Name
VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5
VulDB Base Score: 3.5
VulDB Temp Score: 3.5
VulDB Vector: 🔒
VulDB Reliability: 🔍
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Memory corruption
CWE: CWE-122
ATT&CK: Unknown
Local: No
Remote: Partially
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: no mitigation known
Status: 🔍
0-Day Time: 🔒
08/13/2020 CVE assigned
08/18/2021 Advisory disclosed
08/18/2021 VulDB entry created
08/19/2021 VulDB last updateAdvisory: github.com
Status: Confirmed
CVE: CVE-2020-23333 (🔒)
Created: 08/18/2021 10:19
Updated: 08/19/2021 21:39
Changes: (2) source_cve_assigned source_cve_nvd_summary
Complete: 🔍
Comments
See the underground prices here!