Skip to main content

CVE-2022-43238: n/a in n/a

Medium
VulnerabilityCVE-2022-43238cvecve-2022-43238
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:16:54 UTC

Technical Analysis

CVE-2022-43238 is a vulnerability identified in libde265 version 1.0.8, an open-source HEVC/H.265 video codec library used for decoding video streams. The flaw arises from an unknown crash triggered within the function ff_hevc_put_hevc_qpel_h_3_v_3_sse located in the sse-motion.cc source file. This function is involved in motion compensation during video decoding, specifically handling quarter-pixel interpolation in horizontal and vertical directions using SSE (Streaming SIMD Extensions) optimizations. An attacker can craft a maliciously designed HEVC video file that, when processed by libde265, causes the decoder to crash, resulting in a Denial of Service (DoS). The vulnerability does not affect confidentiality or integrity but impacts availability by causing application or service interruptions. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the attack can be performed remotely over the network without privileges but requires user interaction (e.g., opening or playing the crafted video). No known exploits are currently in the wild, and no patches or vendor advisories have been published as of the data provided. The underlying weakness aligns with CWE-400 (Uncontrolled Resource Consumption), suggesting the crash may be due to resource exhaustion or improper handling of input data during motion compensation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of services or applications that utilize libde265 for HEVC video decoding. This includes media players, streaming platforms, video conferencing tools, and any software or embedded systems relying on this codec. A successful exploitation could lead to application crashes, service downtime, or denial of video playback functionality, affecting user experience and operational continuity. Sectors such as media and entertainment, telecommunications, and any enterprise relying on video processing could be affected. While the vulnerability does not lead to data breaches or code execution, repeated exploitation could be used as a vector for targeted DoS attacks, potentially impacting critical communication or content delivery infrastructures. Given the requirement for user interaction, the risk is mitigated somewhat by user behavior controls but remains significant where untrusted video content is processed automatically or with minimal user oversight.

Mitigation Recommendations

1. Implement strict input validation and sandboxing for video decoding processes to isolate potential crashes and prevent system-wide impact. 2. Restrict or monitor the sources of HEVC video files, especially from untrusted or external origins, to reduce exposure to crafted malicious files. 3. Employ application-level safeguards such as timeout mechanisms and process restarts to recover gracefully from decoder crashes. 4. Where possible, update to newer versions of libde265 or alternative HEVC decoders that have addressed this vulnerability or provide more robust error handling. 5. Educate users and administrators to avoid opening or processing suspicious video files, particularly those received via email or downloaded from unverified sources. 6. Integrate video file scanning with security tools capable of detecting malformed or suspicious HEVC streams. 7. For embedded or specialized systems using libde265, consider disabling HEVC support if not essential or replacing the codec with a more secure alternative.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb8a0

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:16:54 AM

Last updated: 8/11/2025, 11:47:17 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats