Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on September 17th, 2019 📆 | 7653 Views ⚑

0

Bento4 1.5.1-628 Core/Ap4ByteStream.cpp AP4_ByteStream::ReadUI32 denial of service


Powered by iSpeech

CVSS Meta Temp Score Current Exploit Price (β‰ˆ)
3.5 $0-$5k

A vulnerability classified as problematic has been found in Bento4 1.5.1-628 (Multimedia Player Software). Affected is the function AP4_ByteStream::ReadUI32 of the file Core/Ap4ByteStream.cpp. The manipulation with an unknown input leads to a denial of service vulnerability (NULL Pointer Dereference). CWE is classifying the issue as CWE-476. This is going to have an impact on availability.

The weakness was presented 09/16/2019. This vulnerability is traded as CVE-2019-16349 since 09/16/2019. Technical details are known, but there is no available exploit.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Type

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Base Score: β‰ˆ3.5
VulDB Temp Score: β‰ˆ3.5
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”
Class: Denial of service / NULL Pointer Dereference (CWE-476)
Local: Yes
Remote: No

Availability: πŸ”’
Status: Not defined





Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: no mitigation known

0-Day Time: πŸ”’

09/16/2019 Advisory disclosed
09/16/2019 +0 days CVE assigned
09/17/2019 +1 days VulDB entry created
09/17/2019 +0 days VulDB last update
CVE: CVE-2019-16349 (πŸ”’)Created: 09/17/2019 08:53 AM
Complete: πŸ”

Download it now for free!

https://vuldb.com/?id.141858

Tagged with: β€’ β€’ β€’ β€’ β€’



Comments are closed.