### [CVE-2017-14646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14646) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. ### POC #### Reference - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_databuffersetdata-ap4databuffer-cpp/ - https://github.com/axiomatic-systems/Bento4/issues/188 #### Github - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve-