CVE-2025-25943

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Bento4 v1.6.0-641 allows local attackers to execute arbitrary code via the AP4_Stz2Atom component. This affects systems running vulnerable versions of Bento4, particularly those processing untrusted MP4 files locally.

💻 Affected Systems

Products:
  • Bento4
Versions: v1.6.0-641
Operating Systems: All platforms running Bento4
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when processing specially crafted MP4 files through the AP4_Stz2Atom component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system through arbitrary code execution.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when processing malicious MP4 files.

🟢

If Mitigated

Limited impact if proper sandboxing and file validation are implemented.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring local access to exploit.
🏢 Internal Only: MEDIUM - Internal users with access to vulnerable systems could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger the vulnerable component with malicious input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue for latest patched version

Vendor Advisory: https://github.com/axiomatic-systems/Bento4/issues/993

Restart Required: No

Instructions:

1. Visit the GitHub issue page for details
2. Update to the latest Bento4 version
3. Recompile any applications using Bento4 libraries

🔧 Temporary Workarounds

Restrict MP4 file processing

all

Limit processing of untrusted MP4 files through Bento4 components

🧯 If You Can't Patch

  • Implement strict file validation for MP4 inputs
  • Run Bento4 processes with minimal privileges and sandboxing

🔍 How to Verify

Check if Vulnerable:

Check if Bento4 version is 1.6.0-641

Check Version:

Check Bento4 documentation for version command or check installed package version

Verify Fix Applied:

Verify Bento4 has been updated to a version after the fix

📡 Detection & Monitoring

Log Indicators:

  • Crash logs from Bento4 processes
  • Unusual process execution following MP4 file processing

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Process crashes involving Bento4 components or abnormal child process creation from Bento4

🔗 References

📤 Share & Export