High severity8.8NVD Advisory· Published Sep 21, 2017· Updated May 13, 2026
CVE-2017-14639
CVE-2017-14639
Description
AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/axiomatic-systems/Bento4/commit/03d1222ab9c2ce779cdf01bdb96cdd69cbdcfedanvdPatchThird Party Advisory
- blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-underflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/nvdExploitIssue TrackingPatchThird Party AdvisoryVDB Entry
- github.com/axiomatic-systems/Bento4/issues/190nvdExploitThird Party Advisory
News mentions
0No linked articles in our index yet.