Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the AP4 BitReader::ReadCache() at Ap4Utils.cpp component.
References
Link | Resource |
---|---|
https://github.com/axiomatic-systems/Bento4/issues/939 | Exploit Issue Tracking Vendor Advisory |
https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002 | Third Party Advisory |
https://github.com/axiomatic-systems/Bento4/issues/939 | Exploit Issue Tracking Vendor Advisory |
https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002 | Third Party Advisory |
Configurations
History
07 May 2025, 00:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:axiosys:bento4:1.6.0-641:*:*:*:*:*:*:* | |
References | () https://github.com/axiomatic-systems/Bento4/issues/939 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002 - Third Party Advisory | |
First Time |
Axiosys bento4
Axiosys |
Information
Published : 2024-04-02 08:15
Updated : 2025-05-07 00:24
NVD link : CVE-2024-31002
Mitre link : CVE-2024-31002
CVE.ORG link : CVE-2024-31002
JSON object : View
Products Affected
axiosys
- bento4
CWE
CWE-787
Out-of-bounds Write