mirror of
https://github.com/CCExtractor/ccextractor.git
synced 2026-02-04 05:44:53 +00:00
[Bug] Heap-buffer-overflow in parse_PMT #905
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @oneafter on GitHub (Jan 23, 2026).
Description
We discovered a Heap-buffer-overflow vulnerability in ccextractor. The crash occurs in the parse_PMT function when processing a malformed MPEG-TS file.
The ASAN report indicates a READ violation of size 1, occurring 101 bytes past the end of a 184-byte allocated region (standard TS payload buffer).
Environment
Vulnerability Details
The crash happens at line 417. The large offset (101 bytes overflow) suggests that the parser is blindly following a length field specified in the malicious packet header without verifying if it exceeds the actual available data (184 bytes) in the buffer.
Reproduce
ASAN report