Heap-based Buffer Overflow in strukturag/libde265
Valid
Reported on
May 13th 2021
✍️ Description
heap-buffer-overflow of decctx.cc in function read_sps_NAL
🕵️♂️ Proof of Concept
Verification steps: 1.Get the source code of Bento4 2.Compile the Bento4
$ ./autogen.sh
$ export CFLAGS="-g -lpthread -fsanitize=address"
$ export CXXFLAGS="-g -lpthread -fsanitize=address"
$ CC=clang CXX=clang++ ./configure --disable-shared
$ make -j 32
3.run
$./dec265 poc
💥 Impact
This vulnerability is capable of DDOS or code execution
@farindk - thanks for the information. Would you be able to approve and confirm the fix using the action buttons in the drop-down section above?
to join this conversation