Description
A vulnerability was identified in CCExtractor up to 183. This affects the function parse_PAT/parse_PMT in the library src/lib_ccx/ts_tables.c of the component MPEG-TS File Parser. Such manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The name of the patch is fd7271bae238ccb3ae8a71304ea64f0886324925. It is best practice to apply a patch to resolve this issue.
Published: 2026-02-09
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-bounds read leading to potential information disclosure
Action: Patch
AI Analysis

Impact

The vulnerability resides in the parse_PAT and parse_PMT functions of CCExtractor’s MPEG‑TS file parser, causing an out-of-bounds read when processing malformed program association and program map tables. Because the read occurs on data supplied from an MPEG‑TS source, an attacker could extract that memory, resulting in disclosure of sensitive information but not code execution or modification. The weakness aligns with CWE‑119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE‑125 (Out-of-bounds Read).

Affected Systems

CCExtractor versions up to 183 are affected, specifically the src/lib_ccx/ts_tables.c module that parses MPEG‑TS files. The vulnerability is present until the patch identified by commit fd7271bae238ccb3ae8a71304ea64f0886324925 is applied, after which the out-of-bounds read is resolved.

Risk and Exploitability

With a CVSS score of 4.8, the impact is moderate, and the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, but the exploit code is publicly available and might be used. The attack vector is local; the attacker must supply a crafted MPEG‑TS file to the vulnerable process. While the attack cannot bypass local privilege restrictions, it can compromise confidentiality for the running user.

Generated by OpenCVE AI on April 18, 2026 at 18:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CCExtractor to the patched version containing commit fd7271bae238ccb3ae8a71304ea64f0886324925 or later.
  • If updating is not immediately possible, restrict execution of the CCExtractor binary to trusted users and prevent unauthenticated local users from providing custom MPEG‑TS inputs.
  • Implement additional validation or size limits on input data to mitigate the effect of malformed tables before they reach the parsing logic.

Generated by OpenCVE AI on April 18, 2026 at 18:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Ccextractor
Ccextractor ccextractor
Vendors & Products Ccextractor
Ccextractor ccextractor

Mon, 09 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in CCExtractor up to 183. This affects the function parse_PAT/parse_PMT in the library src/lib_ccx/ts_tables.c of the component MPEG-TS File Parser. Such manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The name of the patch is fd7271bae238ccb3ae8a71304ea64f0886324925. It is best practice to apply a patch to resolve this issue.
Title CCExtractor MPEG-TS File ts_tables.c parse_PMT out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ccextractor Ccextractor
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:00:52.166Z

Reserved: 2026-02-09T12:10:11.207Z

Link: CVE-2026-2245

cve-icon Vulnrichment

Updated: 2026-02-10T20:04:06.793Z

cve-icon NVD

Status : Deferred

Published: 2026-02-09T20:15:59.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses