Skip to main content

CVE-2022-43235: n/a in n/a

Medium
VulnerabilityCVE-2022-43235cvecve-2022-43235
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:28:15 UTC

Technical Analysis

CVE-2022-43235 is a heap-buffer-overflow vulnerability identified in libde265 version 1.0.8, specifically within the function ff_hevc_put_hevc_epel_pixels_8_sse located in the sse-motion.cc source file. Libde265 is an open-source HEVC (High Efficiency Video Coding) decoder library used to decode H.265 video streams. The vulnerability arises due to improper bounds checking when processing certain pixel data during motion compensation, which can lead to a heap buffer overflow. An attacker can exploit this flaw by crafting a malicious HEVC video file that triggers the overflow when decoded by libde265. The primary impact of this vulnerability is a Denial of Service (DoS) condition, as the overflow can cause application crashes or memory corruption. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known public exploits have been reported to date, and no official patches are linked, suggesting that remediation may require updating to a fixed version once available or applying custom mitigations. The vulnerability is categorized under CWE-787 (Out-of-bounds Write). Since libde265 is often integrated into multimedia applications, media players, or streaming platforms, any software using this library for HEVC decoding could be vulnerable if it processes untrusted video content. The requirement for user interaction (opening or streaming a crafted video file) limits automated exploitation but does not eliminate risk, especially in environments where users handle external media files or streams.

Potential Impact

For European organizations, the primary impact of CVE-2022-43235 is service disruption due to application crashes or instability in software relying on libde265 for HEVC video decoding. This can affect media companies, broadcasters, streaming services, and any enterprise using video conferencing or multimedia tools that incorporate this library. The denial of service could interrupt business operations, degrade user experience, or cause temporary outages in services dependent on video processing. While the vulnerability does not allow data theft or code execution, the availability impact could be significant in critical environments such as media production, digital signage, or telecommunication services. Additionally, organizations that allow users to upload or share video content may face increased risk if attackers supply malicious video files to trigger crashes. Given the widespread adoption of HEVC for high-efficiency video compression, the vulnerability could affect a broad range of applications, especially those handling user-generated content or streaming media. However, the need for user interaction and the absence of known exploits reduce the immediacy of risk but do not eliminate it.

Mitigation Recommendations

Identify and inventory all software and systems within the organization that utilize libde265 for HEVC decoding, including media players, streaming platforms, and video processing tools. Restrict or sandbox the processing of untrusted or external video files to limit the impact of potential crashes. For example, run video decoding processes with least privilege and in isolated containers or virtual machines. Implement strict input validation and filtering on video content before decoding, such as blocking or quarantining suspicious or malformed HEVC files. Monitor application logs and system stability metrics for signs of crashes or abnormal behavior related to video decoding components. Engage with software vendors or open-source maintainers to obtain patches or updated versions of libde265 that address this vulnerability; apply updates promptly once available. Educate users about the risks of opening video files from untrusted sources and encourage cautious handling of media content received via email or downloads. Consider deploying runtime protection tools that can detect and mitigate heap buffer overflows or memory corruption attempts during video decoding. If patching is delayed, consider temporarily disabling or replacing libde265-based decoding with alternative, secure libraries where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb883

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:28:15 AM

Last updated: 7/26/2025, 10:57:29 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats