Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51792: n/a

0
Low
VulnerabilityCVE-2023-51792cvecve-2023-51792
Published: Fri Apr 19 2024 (04/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:14:46 UTC

Technical Analysis

CVE-2023-51792 identifies a buffer overflow vulnerability in libde265 version 1.0.12, a widely used open-source library for decoding HEVC (High Efficiency Video Coding) video streams. The vulnerability arises when a local attacker causes the library to allocate memory exceeding the maximum supported size of 0x10000000000 (approximately 1 TB), leading to a buffer overflow condition. This overflow can result in a denial of service (DoS) by crashing the application or causing undefined behavior. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), indicating that improper bounds checking or validation of allocation sizes leads to memory corruption. Exploitation requires local access with low privileges (AV:L/PR:L), and no user interaction is necessary (UI:N). The vulnerability does not impact confidentiality or integrity but can disrupt availability by crashing processes that use libde265 for video decoding. Currently, there are no known exploits in the wild, and no patches have been linked yet. The low CVSS score of 3.3 reflects the limited impact and exploitation complexity. Organizations using libde265 in multimedia applications or embedded systems should monitor for updates and apply patches once available to prevent potential denial of service conditions.

Potential Impact

For European organizations, the primary impact of CVE-2023-51792 is the potential for denial of service on systems that utilize libde265 for HEVC video decoding. This could affect media processing servers, video streaming platforms, or embedded devices that rely on this library. The vulnerability requires local access, so the risk is higher in environments where multiple users have local accounts or where attackers can gain initial footholds. Disruption of video decoding services could impact media companies, broadcasters, and enterprises relying on video conferencing or surveillance systems. Although the confidentiality and integrity of data are not compromised, availability interruptions could lead to operational delays or degraded service quality. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to local attackers aiming to disrupt services. European organizations with strict uptime requirements or critical multimedia infrastructure should prioritize mitigation to maintain service continuity.

Mitigation Recommendations

1. Monitor official libde265 repositories and security advisories for patches addressing CVE-2023-51792 and apply updates promptly once available. 2. Restrict local user permissions to minimize the number of users who can execute or interact with applications using libde265, reducing the attack surface. 3. Employ application whitelisting and endpoint protection to detect and prevent unauthorized local code execution attempts. 4. Conduct regular audits of systems running libde265 to identify and isolate vulnerable versions. 5. Where feasible, sandbox or containerize applications using libde265 to limit the impact of potential crashes or denial of service. 6. Implement monitoring for abnormal application crashes or resource usage spikes that could indicate exploitation attempts. 7. Educate system administrators and users about the risks of local privilege abuse and enforce strong access controls. These steps go beyond generic advice by focusing on controlling local access, proactive patch management, and operational monitoring specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5fff58c9332ff09334

Added to database: 11/4/2025, 5:43:59 PM

Last enriched: 11/4/2025, 6:14:46 PM

Last updated: 12/20/2025, 5:17:44 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats