Impact
The vulnerability resides in the parse_PAT and parse_PMT functions of CCExtractor’s MPEG‑TS file parser, causing an out-of-bounds read when processing malformed program association and program map tables. Because the read occurs on data supplied from an MPEG‑TS source, an attacker could extract that memory, resulting in disclosure of sensitive information but not code execution or modification. The weakness aligns with CWE‑119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE‑125 (Out-of-bounds Read).
Affected Systems
CCExtractor versions up to 183 are affected, specifically the src/lib_ccx/ts_tables.c module that parses MPEG‑TS files. The vulnerability is present until the patch identified by commit fd7271bae238ccb3ae8a71304ea64f0886324925 is applied, after which the out-of-bounds read is resolved.
Risk and Exploitability
With a CVSS score of 4.8, the impact is moderate, and the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, but the exploit code is publicly available and might be used. The attack vector is local; the attacker must supply a crafted MPEG‑TS file to the vulnerable process. While the attack cannot bypass local privilege restrictions, it can compromise confidentiality for the running user.
OpenCVE Enrichment