cvelist/2025/0xxx/CVE-2025-0870.json

113 lines
4.5 KiB
JSON
Raw Normal View History

2025-01-30 13:00:37 +00:00
{
2025-01-30 14:00:32 +00:00
"data_version": "4.0",
2025-01-30 13:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-0870",
2025-01-30 14:00:32 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2025-01-30 13:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-01-30 14:00:32 +00:00
"value": "A vulnerability was found in Axiomatic Bento4 up to 1.6.0-641. It has been rated as critical. Affected by this issue is the function AP4_DataBuffer::GetData in the library Ap4DataBuffer.h. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in Axiomatic Bento4 bis 1.6.0-641 ausgemacht. Es geht hierbei um die Funktion AP4_DataBuffer::GetData in der Bibliothek Ap4DataBuffer.h. Durch Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Axiomatic",
"product": {
"product_data": [
{
"product_name": "Bento4",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.6.0-641"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.294056",
"refsource": "MISC",
"name": "https://vuldb.com/?id.294056"
},
{
"url": "https://vuldb.com/?ctiid.294056",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.294056"
},
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/980",
"refsource": "MISC",
"name": "https://github.com/axiomatic-systems/Bento4/issues/980"
},
{
"url": "https://github.com/user-attachments/files/16929290/Bug2.zip",
"refsource": "MISC",
"name": "https://github.com/user-attachments/files/16929290/Bug2.zip"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.6,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.6,
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.1,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
2025-01-30 13:00:37 +00:00
}
]
}
}