CVE-2024-57513

6.5 MEDIUM

📋 TL;DR

A floating-point exception vulnerability in Bento4's AP4_TfraAtom function allows attackers to cause denial of service by crashing applications that process malicious MP4 files. This affects any software using vulnerable versions of the Bento4 library for media processing. The vulnerability is triggered when parsing specially crafted MP4 container files.

💻 Affected Systems

Products:
  • Bento4
  • Applications using Bento4 library
Versions: All versions prior to fix (specific patched version not specified in references)
Operating Systems: All platforms where Bento4 runs (Windows, Linux, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses Bento4 to parse MP4 files is vulnerable. The vulnerability is in the library itself, not dependent on specific configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to denial of service for media processing services, potentially disrupting video streaming, editing, or conversion workflows.

🟠

Likely Case

Application crash when processing malicious MP4 files, causing temporary service disruption until the process restarts.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing; crashes would be contained to isolated processes.

🌐 Internet-Facing: MEDIUM - Applications accepting user-uploaded media files could be targeted with malicious MP4 files to cause service disruption.
🏢 Internal Only: LOW - Requires local file access or internal media processing workflows; less exposure than internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept available in GitHub gist. Exploitation requires only a malicious MP4 file to be processed by vulnerable software. No authentication needed if application accepts file uploads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references (check latest Bento4 releases)

Vendor Advisory: https://github.com/axiomatic-systems/Bento4/issues/990

Restart Required: Yes

Instructions:

1. Check Bento4 GitHub repository for latest release
2. Update Bento4 library to patched version
3. Rebuild/redeploy applications using Bento4
4. Restart affected services

🔧 Temporary Workarounds

Input Validation for MP4 Files

all

Implement strict validation of MP4 files before processing with Bento4 library

Process Isolation

all

Run media processing in isolated containers or sandboxes to contain crashes

🧯 If You Can't Patch

  • Implement strict file upload restrictions for MP4 files
  • Deploy monitoring to detect and block repeated crash attempts

🔍 How to Verify

Check if Vulnerable:

Test with proof-of-concept MP4 file from GitHub gist; if application crashes, it's vulnerable

Check Version:

Check Bento4 version in application dependencies or library files

Verify Fix Applied:

Test with same proof-of-concept file after update; application should process file without crashing

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with floating-point exceptions
  • Segmentation faults in media processing components
  • Repeated process restarts after MP4 file processing

Network Indicators:

  • Multiple MP4 file uploads followed by service disruption
  • Unusual patterns in media file uploads

SIEM Query:

source="application.log" AND ("floating point" OR "SIGFPE" OR "divide by zero") AND "mp4"

🔗 References

📤 Share & Export