CVE-2022-43235: n/a in n/a
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
AI Analysis
Technical Summary
CVE-2022-43235 is a heap-buffer-overflow vulnerability identified in libde265 version 1.0.8, specifically within the function ff_hevc_put_hevc_epel_pixels_8_sse located in the sse-motion.cc source file. Libde265 is an open-source HEVC (High Efficiency Video Coding) decoder library used to decode H.265 video streams. The vulnerability arises due to improper bounds checking when processing certain pixel data during motion compensation, which can lead to a heap buffer overflow. An attacker can exploit this flaw by crafting a malicious HEVC video file that triggers the overflow when decoded by libde265. The primary impact of this vulnerability is a Denial of Service (DoS) condition, as the overflow can cause application crashes or memory corruption. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known public exploits have been reported to date, and no official patches are linked, suggesting that remediation may require updating to a fixed version once available or applying custom mitigations. The vulnerability is categorized under CWE-787 (Out-of-bounds Write). Since libde265 is often integrated into multimedia applications, media players, or streaming platforms, any software using this library for HEVC decoding could be vulnerable if it processes untrusted video content. The requirement for user interaction (opening or streaming a crafted video file) limits automated exploitation but does not eliminate risk, especially in environments where users handle external media files or streams.
Potential Impact
For European organizations, the primary impact of CVE-2022-43235 is service disruption due to application crashes or instability in software relying on libde265 for HEVC video decoding. This can affect media companies, broadcasters, streaming services, and any enterprise using video conferencing or multimedia tools that incorporate this library. The denial of service could interrupt business operations, degrade user experience, or cause temporary outages in services dependent on video processing. While the vulnerability does not allow data theft or code execution, the availability impact could be significant in critical environments such as media production, digital signage, or telecommunication services. Additionally, organizations that allow users to upload or share video content may face increased risk if attackers supply malicious video files to trigger crashes. Given the widespread adoption of HEVC for high-efficiency video compression, the vulnerability could affect a broad range of applications, especially those handling user-generated content or streaming media. However, the need for user interaction and the absence of known exploits reduce the immediacy of risk but do not eliminate it.
Mitigation Recommendations
Identify and inventory all software and systems within the organization that utilize libde265 for HEVC decoding, including media players, streaming platforms, and video processing tools. Restrict or sandbox the processing of untrusted or external video files to limit the impact of potential crashes. For example, run video decoding processes with least privilege and in isolated containers or virtual machines. Implement strict input validation and filtering on video content before decoding, such as blocking or quarantining suspicious or malformed HEVC files. Monitor application logs and system stability metrics for signs of crashes or abnormal behavior related to video decoding components. Engage with software vendors or open-source maintainers to obtain patches or updated versions of libde265 that address this vulnerability; apply updates promptly once available. Educate users about the risks of opening video files from untrusted sources and encourage cautious handling of media content received via email or downloads. Consider deploying runtime protection tools that can detect and mitigate heap buffer overflows or memory corruption attempts during video decoding. If patching is delayed, consider temporarily disabling or replacing libde265-based decoding with alternative, secure libraries where feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-43235: n/a in n/a
Description
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
AI-Powered Analysis
Technical Analysis
CVE-2022-43235 is a heap-buffer-overflow vulnerability identified in libde265 version 1.0.8, specifically within the function ff_hevc_put_hevc_epel_pixels_8_sse located in the sse-motion.cc source file. Libde265 is an open-source HEVC (High Efficiency Video Coding) decoder library used to decode H.265 video streams. The vulnerability arises due to improper bounds checking when processing certain pixel data during motion compensation, which can lead to a heap buffer overflow. An attacker can exploit this flaw by crafting a malicious HEVC video file that triggers the overflow when decoded by libde265. The primary impact of this vulnerability is a Denial of Service (DoS) condition, as the overflow can cause application crashes or memory corruption. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known public exploits have been reported to date, and no official patches are linked, suggesting that remediation may require updating to a fixed version once available or applying custom mitigations. The vulnerability is categorized under CWE-787 (Out-of-bounds Write). Since libde265 is often integrated into multimedia applications, media players, or streaming platforms, any software using this library for HEVC decoding could be vulnerable if it processes untrusted video content. The requirement for user interaction (opening or streaming a crafted video file) limits automated exploitation but does not eliminate risk, especially in environments where users handle external media files or streams.
Potential Impact
For European organizations, the primary impact of CVE-2022-43235 is service disruption due to application crashes or instability in software relying on libde265 for HEVC video decoding. This can affect media companies, broadcasters, streaming services, and any enterprise using video conferencing or multimedia tools that incorporate this library. The denial of service could interrupt business operations, degrade user experience, or cause temporary outages in services dependent on video processing. While the vulnerability does not allow data theft or code execution, the availability impact could be significant in critical environments such as media production, digital signage, or telecommunication services. Additionally, organizations that allow users to upload or share video content may face increased risk if attackers supply malicious video files to trigger crashes. Given the widespread adoption of HEVC for high-efficiency video compression, the vulnerability could affect a broad range of applications, especially those handling user-generated content or streaming media. However, the need for user interaction and the absence of known exploits reduce the immediacy of risk but do not eliminate it.
Mitigation Recommendations
Identify and inventory all software and systems within the organization that utilize libde265 for HEVC decoding, including media players, streaming platforms, and video processing tools. Restrict or sandbox the processing of untrusted or external video files to limit the impact of potential crashes. For example, run video decoding processes with least privilege and in isolated containers or virtual machines. Implement strict input validation and filtering on video content before decoding, such as blocking or quarantining suspicious or malformed HEVC files. Monitor application logs and system stability metrics for signs of crashes or abnormal behavior related to video decoding components. Engage with software vendors or open-source maintainers to obtain patches or updated versions of libde265 that address this vulnerability; apply updates promptly once available. Educate users about the risks of opening video files from untrusted sources and encourage cautious handling of media content received via email or downloads. Consider deploying runtime protection tools that can detect and mitigate heap buffer overflows or memory corruption attempts during video decoding. If patching is delayed, consider temporarily disabling or replacing libde265-based decoding with alternative, secure libraries where feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb883
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:28:15 AM
Last updated: 7/26/2025, 10:57:29 PM
Views: 9
Related Threats
CVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.