CVE-2025-25944

7.3 HIGH

📋 TL;DR

A buffer overflow vulnerability in Bento4 v1.6.0-641 allows local attackers to execute arbitrary code by crafting a malicious MP4 file and processing it with mp4fragment. This affects systems running vulnerable Bento4 versions where users process untrusted MP4 files.

💻 Affected Systems

Products:
  • Bento4
Versions: v1.6.0-641
Operating Systems: All platforms running Bento4
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where mp4fragment is used to process MP4 files from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise with attacker-controlled code execution.

🟠

Likely Case

Local user gains elevated privileges or executes arbitrary code in the context of the mp4fragment process.

🟢

If Mitigated

Limited impact if proper sandboxing and least privilege principles are applied to media processing tools.

🌐 Internet-Facing: LOW - Requires local access and user interaction with crafted files.
🏢 Internal Only: MEDIUM - Internal users could exploit this for privilege escalation if they can supply malicious MP4 files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to supply crafted MP4 file to mp4fragment. Buffer overflow in AP4_RtpAtom constructor.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Bento4 v1.6.0-642 or later

Vendor Advisory: https://github.com/axiomatic-systems/Bento4/issues/993

Restart Required: No

Instructions:

1. Visit GitHub repository. 2. Update to latest Bento4 version. 3. Recompile/reinstall if using source. 4. Replace existing mp4fragment binary.

🔧 Temporary Workarounds

Restrict mp4fragment usage

all

Limit execution of mp4fragment to trusted users and environments only

chmod 750 /path/to/mp4fragment
setfacl -m u:trusteduser:rx /path/to/mp4fragment

🧯 If You Can't Patch

  • Run mp4fragment in sandboxed/containerized environment with minimal privileges
  • Implement strict input validation for MP4 files before processing

🔍 How to Verify

Check if Vulnerable:

Check Bento4 version: mp4fragment --version | grep '1.6.0-641'

Check Version:

mp4fragment --version

Verify Fix Applied:

Verify version is 1.6.0-642 or later: mp4fragment --version

📡 Detection & Monitoring

Log Indicators:

  • Segmentation faults or abnormal termination of mp4fragment process
  • Unusual process execution patterns for mp4fragment

Network Indicators:

  • None - local exploitation only

SIEM Query:

Process:name='mp4fragment' AND (EventID=1000 OR TerminationReason='segmentation fault')

🔗 References

📤 Share & Export