CVE-2024-49778

A heap-based buffer overflow in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file.
References
Link Resource
https://github.com/justdan96/tsMuxer/issues/879 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*

History

05 Sep 2025, 00:05

Type Values Removed Values Added
CPE cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*
References () https://github.com/justdan96/tsMuxer/issues/879 - () https://github.com/justdan96/tsMuxer/issues/879 - Exploit, Issue Tracking
First Time Justdan96 tsmuxer
Justdan96

15 Nov 2024, 18:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-120

15 Nov 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Un desbordamiento de búfer basado en montón en tsMuxer versión nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegación de servicio (DoS) y ejecución de código a través de un archivo de video MOV manipulado.

14 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-14 23:15

Updated : 2025-09-05 00:05


NVD link : CVE-2024-49778

Mitre link : CVE-2024-49778

CVE.ORG link : CVE-2024-49778


JSON object : View

Products Affected

justdan96

  • tsmuxer
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')