-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
heap-buffer-overflow in MediaInfoLib::File_Id3v2::Data_Parse() ../../../Source/MediaInfo/Tag/File_Id3v2.cpp:597 #2105
Comments
Issue in MediaArea/MediaInfoLib?
|
Yes, maybe I should open this issue in MediaArea/MediaInfoLib? |
@JeromeMartinez Memory-related:
Redundant/repeated checks in
MediaInfoLib/Source/MediaInfo/Audio/File_Adm.cpp Line 5468 in dbed027
Cppcheck also found:
MediaInfoLib/Source/MediaInfo/Audio/File_Iab.cpp Lines 117 to 118 in dbed027
If I understand the intention correctly, I think this should be: if (Code>=0x80 && Code-0x68<sizeof(Iab_Channel_Values)/sizeof(const char*))
return Iab_Channel_Values[Code-0x68]; |
This one likely a false positive since there is already a check: MediaInfoLib/Source/MediaInfo/Audio/File_Aac_GeneralAudio_Sbr.cpp Lines 896 to 897 in abdbb21
So this should not be possible to be out-of-bounds:
|
Summary
A heap-buffer-overflow vulnerability was found in MediaInfo, it may cause arbitrary code execution.
Version
Details
ASAN output:
Poc
heap_overflow_mediainfo.tar.gz
reproduce:
The text was updated successfully, but these errors were encountered: