CVE-2024-38949: Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application...
6.5
Basic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis is based on the provided vulnerability description and, crucially, the ASAN stack traces from the GitHub issue #460. The issue explicitly mentions that the vulnerability is in the display444as420 function in sdl.cc. The ASAN logs confirm this and also implicate SDL_YUV_Display::display420 due to a heap buffer overflow during a memcpy operation (READ overflow), and SDL_YUV_Display::display444as420 due to a direct heap buffer overflow (WRITE overflow). The functions higher in the call stack (SDL_YUV_Display::display, display_sdl, output_image, main) are included as they are runtime indicators that would appear in a profiler during exploitation, leading to the vulnerable functions. Since no patch information was available, the evidence is drawn directly from the ASAN crash reports which pinpoint the vulnerable code execution paths. The confidence levels reflect how directly the function is involved in the overflow: 'high' for the functions where the overflow occurs, 'medium' for direct callers handling the tainted data, and 'low' for higher-level functions in the call chain.