Meltytech Shotcut 25.10.31 is vulnerable to Buffer Overflow. A memory access violation occurs when processing MLT project files with manipulated width and height parameters. By setting these values to extremely large numbers, the application attempts to allocate excessive memory during image processing, triggering a buffer overflow in the mlt_image_fill_white function.
History

Wed, 17 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 17 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 17 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Meltytech
Meltytech shotcut
Vendors & Products Meltytech
Meltytech shotcut

Tue, 16 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Description Meltytech Shotcut 25.10.31 is vulnerable to Buffer Overflow. A memory access violation occurs when processing MLT project files with manipulated width and height parameters. By setting these values to extremely large numbers, the application attempts to allocate excessive memory during image processing, triggering a buffer overflow in the mlt_image_fill_white function.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-17T14:43:17.503Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65834

cve-icon Vulnrichment

Updated: 2025-12-17T14:43:11.332Z

cve-icon NVD

Status : Received

Published: 2025-12-16T20:15:48.937

Modified: 2025-12-17T15:15:51.080

Link: CVE-2025-65834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-17T14:28:52Z