Description
A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-31
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local heap-based buffer overflow
Action: Assess Impact
AI Analysis

Impact

The vulnerability exists in the AP4_BitReader::SkipBits function of the Ap4Dac4Atom.cpp file in Bento4’s DSI v1 Parser module. Manipulating the n_presentations argument can trigger a heap‑based buffer overflow, potentially corrupting memory, causing the application to crash, or enabling overwriting of executable data. This weakness aligns with CWE‑119 (Improper Handling of Buffer Size) and CWE‑122 (Heap-based Buffer Overflow). While the exploit requires local access to the Bento4 process, the resulting memory corruption could lead to denial of service or, in rare cases, local privilege escalation if an attacker can inject executable payloads.

Affected Systems

All users running Axiomatic Bento4 versions up to and including 1.6.0‑641 are affected, as identified in the vendor’s issue report. No further versions are explicitly listed, so releases after 1.6.0‑641 should be safe until an official update is confirmed.

Risk and Exploitability

The CVSS base score is 4.8, indicating moderate severity, and no EPSS data is provided. The vulnerability has not been catalogued in CISA’s KEV database. Attackers must have local access to the Bento4 process to manipulate the SkipBits argument; however, publicly available exploit code demonstrates that the attack can be automated once local control is achieved. Because no official patch has been released, the risk remains until an update or mitigation is applied.

Generated by OpenCVE AI on April 1, 2026 at 06:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a newer release of Bento4 that resolves this issue is available and upgrade immediately.
  • If no patch exists, run Bento4 with the least privilege necessary and restrict local access to trusted users only.
  • Monitor system logs for abnormal crashes or segmentation faults that may indicate an attempted buffer overflow.
  • Apply future official security updates from Axiomatic as soon as they are released.
  • Consider sandboxing or containerizing Bento4 to contain potential memory corruption.

Generated by OpenCVE AI on April 1, 2026 at 06:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Axiomatic
Axiomatic bento4
Vendors & Products Axiomatic
Axiomatic bento4

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Axiomatic Bento4 DSI v1 Ap4Dac4Atom.cpp SkipBits heap-based overflow
First Time appeared Bento4
Bento4 bento4
Weaknesses CWE-119
CWE-122
CPEs cpe:2.3:a:bento4:bento4:*:*:*:*:*:*:*:*
Vendors & Products Bento4
Bento4 bento4
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T16:39:04.400Z

Reserved: 2026-03-31T14:08:36.184Z

Link: CVE-2026-5236

cve-icon Vulnrichment

Updated: 2026-04-03T16:38:50.479Z

cve-icon NVD

Status : Deferred

Published: 2026-03-31T23:17:11.393

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5236

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:09:58Z

Weaknesses