Description
A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-31
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local heap-based buffer overflow in Bento4 MP4 file parser
Action: Assess Impact
AI Analysis

Impact

A heap-based buffer overflow occurs in the AP4_BitReader::ReadCache function within the Ap4Dac4Atom.cpp component of Bento4. The flaw allows crafted MP4 input to overwrite heap memory, potentially corrupting program state and causing crashes or other unpredictable behavior. The CVE documentation does not assert that the overflow necessarily leads to arbitrary code execution, only that it can be exploited when the application processes an attacker‑controlled MP4 file.

Affected Systems

The vulnerability affects all releases of Axiomatic Bento4 up to version 1.6.0‑641. This includes any installations that use the Bento4 MP4 processing library distributed by Axiomatic. No other vendors or product versions are listed.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity. Exploitation requires local access to the system running the vulnerable Bento4 binary; remote exploitation is not described. The vulnerability has been publicly disclosed, and an exploit may be utilized locally, but it is not currently listed in the CISA KEV catalog and the EPSS score is unavailable. The risk is primarily a local privilege escalation or stability issue for systems that run Bento4 under potentially untrusted contexts.

Generated by OpenCVE AI on April 1, 2026 at 06:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a new version of Bento4 is available; upgrade to a release newer than 1.6.0‑641 if possible.
  • Limit Bento4 execution to trusted users and run it with the least privileges necessary.
  • Monitor systems for crashes or abnormal behavior that might indicate exploitation of the MP4 parser.
  • Contact Axiomatic for an official patch or detailed guidance if a newer release is not yet available.

Generated by OpenCVE AI on April 1, 2026 at 06:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Axiomatic
Axiomatic bento4
Vendors & Products Axiomatic
Axiomatic bento4

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title Axiomatic Bento4 MP4 File Ap4Dac4Atom.cpp ReadCache heap-based overflow
First Time appeared Bento4
Bento4 bento4
Weaknesses CWE-119
CWE-122
CPEs cpe:2.3:a:bento4:bento4:*:*:*:*:*:*:*:*
Vendors & Products Bento4
Bento4 bento4
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T12:26:03.529Z

Reserved: 2026-03-31T14:08:31.340Z

Link: CVE-2026-5235

cve-icon Vulnrichment

Updated: 2026-04-01T12:25:57.730Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T23:17:11.163

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-5235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:05Z

Weaknesses