CVE-2020-36129
📋 TL;DR
CVE-2020-36129 is a stack buffer overflow vulnerability in AOM (AOMedia Video 1) codec library version 2.0.1 that allows attackers to execute arbitrary code or cause denial of service. It affects systems using the vulnerable AOM library for video processing. The vulnerability is triggered through the src/aom_image.c component when processing specially crafted video files.
💻 Affected Systems
- AOM (AOMedia Video 1) library
- Applications using libaom for video encoding/decoding
- Web browsers with AOM support
- Media processing software
📦 What is this software?
Aomedia by Aomedia
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Application crash causing denial of service, potentially leading to service disruption for video processing applications.
If Mitigated
Limited impact with proper memory protection mechanisms (ASLR, DEP) that may prevent code execution but still cause crashes.
🎯 Exploit Status
Proof of concept exists in the Chromium bug tracker. Exploitation requires the target to process a malicious video file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AOM v2.0.2 and later
Vendor Advisory: https://bugs.chromium.org/p/aomedia/issues/detail?id=2912
Restart Required: Yes
Instructions:
1. Update AOM library to version 2.0.2 or later. 2. Rebuild or update applications using libaom. 3. Restart affected services. 4. For package managers: Use system updates (apt upgrade libaom, yum update libaom, etc.)
🔧 Temporary Workarounds
Disable AOM video processing
allConfigure applications to avoid using AOM codec for video processing
Application-specific configuration required
Input validation for video files
allImplement strict validation/sanitization of uploaded video files
Implement file type verification and size limits
🧯 If You Can't Patch
- Implement network segmentation to isolate systems using AOM library
- Deploy application allowlisting to prevent unauthorized video processing applications
🔍 How to Verify
Check if Vulnerable:
Check AOM library version: aomenc --version or check installed package version
Check Version:
aomenc --version 2>/dev/null || dpkg -l | grep libaom || rpm -qa | grep libaom
Verify Fix Applied:
Verify AOM version is 2.0.2 or higher: aomenc --version | grep -q '2\.0\.[2-9]\|2\.[1-9]\|3\.'
📡 Detection & Monitoring
Log Indicators:
- Application crashes with segmentation faults
- Memory corruption errors in application logs
- Unexpected process termination of video processing services
Network Indicators:
- Unusual outbound connections from video processing systems
- Large video file uploads to vulnerable endpoints
SIEM Query:
Process termination events from video encoding/decoding applications OR Application logs containing 'segmentation fault' 'buffer overflow' 'aom'