Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25452: n/a

0
Medium
VulnerabilityCVE-2024-25452cvecve-2024-25452
Published: Fri Feb 09 2024 (02/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-25452 is a medium severity vulnerability in Bento4 v1. 6. 0-640 caused by an out-of-memory bug in the AP4_UrlAtom::AP4_UrlAtom() function. Exploitation requires local access and user interaction but no privileges. The flaw leads to denial of service by exhausting memory, impacting availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild. Organizations using Bento4 for media processing should monitor for patches and apply mitigations to prevent potential service disruption. This vulnerability primarily affects environments running vulnerable Bento4 versions, especially where untrusted input is processed. Countries with significant media and streaming infrastructure using Bento4 are at higher risk. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:37:24 UTC

Technical Analysis

CVE-2024-25452 identifies an out-of-memory vulnerability in the Bento4 multimedia framework version 1.6.0-640, specifically within the constructor function AP4_UrlAtom::AP4_UrlAtom(). Bento4 is an open-source library widely used for parsing and processing MP4 files and related media containers. The vulnerability arises when the function improperly handles input data, leading to excessive memory allocation requests that can exhaust system memory resources. This condition can cause the affected application or service to crash or become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the software does not adequately limit resource usage. According to the CVSS v3.1 vector, the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The scope remains unchanged (S:U), and the impact affects only availability (A:H) without compromising confidentiality or integrity. There are no known exploits in the wild, and no patches have been officially released at the time of publication. The vulnerability is relevant for any deployment of Bento4 v1.6.0-640 where untrusted or malformed media files might be processed, potentially allowing attackers to trigger the out-of-memory condition by crafting malicious input files.

Potential Impact

The primary impact of CVE-2024-25452 is denial of service through resource exhaustion, which can disrupt media processing workflows relying on Bento4. Organizations that use Bento4 in media streaming, content delivery, or video processing pipelines may experience application crashes or service outages if exposed to crafted malicious media files. This can lead to downtime, degraded user experience, and potential operational costs associated with recovery and incident response. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are unlikely. However, availability disruptions can be critical for media service providers, broadcasters, and enterprises relying on continuous media processing. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread automated attacks. Nonetheless, insider threats or compromised user accounts could leverage this vulnerability to cause targeted disruptions.

Mitigation Recommendations

To mitigate CVE-2024-25452, organizations should implement the following specific measures: 1) Restrict access to systems running Bento4 to trusted users only, minimizing the risk of local exploitation. 2) Avoid processing untrusted or unauthenticated media files with vulnerable Bento4 versions. 3) Employ input validation and sanitization mechanisms upstream to detect and block malformed or suspicious media content before it reaches Bento4 processing. 4) Monitor system memory usage and application logs for signs of abnormal resource consumption or crashes related to media processing. 5) Implement resource limits (e.g., memory quotas, container limits) on Bento4 processes to prevent system-wide impact from out-of-memory conditions. 6) Stay alert for official patches or updates from Bento4 maintainers and apply them promptly once available. 7) Consider deploying runtime application self-protection (RASP) or endpoint detection solutions that can detect and block anomalous behavior during media parsing. These targeted mitigations go beyond generic advice by focusing on access control, input filtering, resource management, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d68b7ef31ef0b571ee5

Added to database: 2/25/2026, 9:45:12 PM

Last enriched: 2/26/2026, 10:37:24 AM

Last updated: 2/26/2026, 12:42:41 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats