Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33165: CWE-787: Out-of-bounds Write in strukturag libde265

0
Medium
VulnerabilityCVE-2026-33165cvecve-2026-33165cwe-787
Published: Fri Mar 20 2026 (03/20/2026, 20:32:36 UTC)
Source: CVE Database V5
Vendor/Project: strukturag
Product: libde265

Description

libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a crafted HEVC bitstream causes an out-of-bounds heap write confirmed by AddressSanitizer. The trigger is a stale ctb_info.log2unitSize after an SPS change where PicWidthInCtbsY and PicHeightInCtbsY stay constant but Log2CtbSizeY changes, causing set_SliceHeaderIndex to index past the allocated image metadata array and write 2 bytes past the end of a heap allocation. This issue has been patched in version 1.0.17.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:08:58 UTC

Technical Analysis

CVE-2026-33165 is a heap out-of-bounds write vulnerability classified under CWE-787 found in libde265, an open-source implementation of the H.265/HEVC video codec. The issue arises prior to version 1.0.17 when a specially crafted HEVC bitstream triggers a stale ctb_info.log2unitSize value after a Sequence Parameter Set (SPS) change. Specifically, when PicWidthInCtbsY and PicHeightInCtbsY remain constant but Log2CtbSizeY changes, the function set_SliceHeaderIndex incorrectly indexes beyond the allocated image metadata array. This results in a 2-byte write past the end of a heap allocation, confirmed by AddressSanitizer. The vulnerability does not affect confidentiality or integrity but can cause application crashes or denial of service due to heap corruption. Exploitation requires user interaction to process malicious video content, and no privileges are required. The flaw has been addressed in libde265 version 1.0.17. No public exploits have been observed in the wild, but the vulnerability poses a risk to applications that decode untrusted HEVC streams using vulnerable libde265 versions.

Potential Impact

The primary impact of CVE-2026-33165 is denial of service caused by heap corruption leading to application crashes when processing maliciously crafted HEVC video streams. This can disrupt media playback or streaming services relying on libde265, affecting user experience and potentially causing service outages. Since the vulnerability does not compromise confidentiality or integrity, it is less likely to be exploited for data theft or code execution. However, in environments where video decoding is part of critical workflows or embedded systems, repeated crashes could degrade system reliability. The requirement for user interaction and local access limits remote exploitation, but attackers could leverage social engineering to deliver malicious video files. Organizations using libde265 in media players, streaming platforms, or video processing pipelines worldwide may face operational disruptions if unpatched.

Mitigation Recommendations

To mitigate CVE-2026-33165, organizations should immediately update libde265 to version 1.0.17 or later, where the vulnerability is patched. For environments where immediate updating is not feasible, applying input validation or sandboxing video decoding processes can reduce risk by isolating potential crashes. Employing runtime protections such as AddressSanitizer or other memory safety tools during development and testing can help detect similar issues early. Additionally, restricting the processing of untrusted or unauthenticated HEVC streams and educating users about the risks of opening unknown video files can reduce exposure. Monitoring for unusual application crashes in media components may help detect exploitation attempts. Vendors embedding libde265 should ensure timely integration of the patched version and communicate updates to downstream users.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdb3ffe32a4fbe5fced8f2

Added to database: 3/20/2026, 8:54:23 PM

Last enriched: 3/20/2026, 9:08:58 PM

Last updated: 3/21/2026, 1:50:23 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses