A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file.
References
Link | Resource |
---|---|
https://github.com/justdan96/tsMuxer/issues/841 | Exploit Issue Tracking |
https://ricercasecurity.blogspot.com/2024/10/rezzuf0-day-cve-2024-41209.html | Exploit Third Party Advisory |
Configurations
History
05 Sep 2025, 00:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Justdan96
Justdan96 tsmuxer |
|
References | () https://github.com/justdan96/tsMuxer/issues/841 - Exploit, Issue Tracking | |
References | () https://ricercasecurity.blogspot.com/2024/10/rezzuf0-day-cve-2024-41209.html - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:justdan96:tsmuxer:nightly-2024-03-14-01-51-12:*:*:*:*:*:*:* |
Information
Published : 2024-11-14 23:15
Updated : 2025-09-05 00:12
NVD link : CVE-2024-41209
Mitre link : CVE-2024-41209
CVE.ORG link : CVE-2024-41209
JSON object : View
Products Affected
justdan96
- tsmuxer
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')