CVE-2024-57510

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Bento4's mp42avc tool allows local attackers to execute arbitrary code by exploiting the AP4_MemoryByteStream::WritePartial function. This affects systems running vulnerable versions of Bento4 where mp42avc is installed and accessible to local users. Attackers could gain elevated privileges or compromise the system.

💻 Affected Systems

Products:
  • Bento4
  • mp42avc (Bento4 tool)
Versions: Versions up to and including commit 3bdc891602d19789b8e8626e4a3e613a937b4d35
Operating Systems: All platforms where Bento4 is installed (Linux, Windows, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where mp42avc is installed and accessible to local users. Bento4 is commonly used for multimedia processing.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local user gains unauthorized code execution with the privileges of the mp42avc process, potentially leading to lateral movement.

🟢

If Mitigated

Limited impact if proper access controls restrict local user execution or if the tool isn't installed.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Local users could exploit this, but requires specific conditions (tool installed and accessible).

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of buffer overflow techniques. No public exploit code is available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 3bdc891602d19789b8e8626e4a3e613a937b4d35

Vendor Advisory: https://github.com/axiomatic-systems/Bento4/issues/989

Restart Required: No

Instructions:

1. Update Bento4 to the latest version from the official GitHub repository. 2. Recompile mp42avc from updated source. 3. Replace existing mp42avc binary with patched version.

🔧 Temporary Workarounds

Remove or restrict mp42avc access

all

Remove the mp42avc binary or restrict execute permissions to prevent local exploitation.

sudo rm /path/to/mp42avc
sudo chmod 000 /path/to/mp42avc

🧯 If You Can't Patch

  • Remove mp42avc from systems where it's not essential.
  • Implement strict access controls to prevent unauthorized local users from executing mp42avc.

🔍 How to Verify

Check if Vulnerable:

Check Bento4 version: git log --oneline | head -1. If commit hash matches or is earlier than 3bdc891602d19789b8e8626e4a3e613a937b4d35, system is vulnerable.

Check Version:

git log --oneline | head -1

Verify Fix Applied:

Verify Bento4 is updated to a commit after 3bdc891602d19789b8e8626e4a3e613a937b4d35 using git log.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution of mp42avc with abnormal arguments
  • Crash logs from mp42avc indicating buffer overflow

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process execution where process_name='mp42avc' AND command_line CONTAINS suspicious patterns

🔗 References

📤 Share & Export