Description
MediaArea MediaInfoLib Channel Splitting heap-based buffer overflow vulnerability
Published: 2026-05-20
Score: 7.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a heap-based buffer overflow in the MediaArea MediaInfoLib component that handles channel splitting. The flaw allows corruption of the heap when parsing a crafted media file, potentially leading to arbitrary code execution or memory corruption during file evaluation. The weakness is identified as CWE-122, indicating a bounds‑check failure that can result in out‑of‑bounds writes.

Affected Systems

Affected product is MediaInfoLib from MediaArea. The advisory does not list specific release versions; we infer that any build containing the unpatched channel‑splitting routine could be vulnerable. Applications that embed MediaInfoLib – such as media players, editors, or transcoding tools – may also be impacted, as they typically parse media files that could trigger the overflow.

Risk and Exploitability

The CVSS score of 7.8 reflects significant impact and a moderate likelihood of exploitation. EPSS is not available, and the issue is not listed in the KEV catalog, suggesting that publicly known exploit code may not yet be widespread. The likely attack vector is a locally crafted media file that is parsed by the vulnerable library; based on the description, we infer that if the library is exposed to untrusted input, remote exploitation may be possible through applications that load such files. No official patch or workaround is listed, so the reliable mitigation is to upgrade to a version that resolves the channel‑splitting buffer overflow.

Generated by OpenCVE AI on May 20, 2026 at 15:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MediaInfoLib to the latest version released by MediaArea that contains the channel‑splitting heap‑overflow fix.
  • If an upgrade is not immediately possible, configure applications to reject or quarantine files that trigger channel‑splitting parsing before processing through the library.
  • Verify that no legacy MediaInfoLib binaries are inadvertently linked into your build chain, and replace them with the patched library to prevent accidental use of the vulnerable code.

Generated by OpenCVE AI on May 20, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Channel Splitting Heap‑Based Buffer Overflow in MediaArea MediaInfoLib

Wed, 20 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description MediaArea MediaInfoLib Channel Splitting heap-based buffer overflow vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-05-20T14:24:10.150Z

Reserved: 2026-03-16T12:44:48.470Z

Link: CVE-2026-22554

cve-icon Vulnrichment

Updated: 2026-05-20T14:24:06.334Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T14:16:38.763

Modified: 2026-05-20T14:25:57.283

Link: CVE-2026-22554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T16:00:06Z

Weaknesses