Impact
The vulnerability resides in the setFPS function of tsMuxer’s vvc.cpp module. Manipulating the track_id argument can trigger a denial of service by causing the application to terminate unexpectedly. The defect is categorized as CWE-404, a missing error handling error.
Affected Systems
Justdan96 tsMuxer versions up to 2.7.0 are affected. These releases are no longer maintained or supported by the developer. No newer supported versions have been confirmed to contain a fix.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. It requires local access to the host; an attacker must be able to execute code on the system to exploit it. While local exploitation limits the potential impact to the affected machine, the denial of service can disrupt services relying on tsMuxer.
OpenCVE Enrichment