A vulnerability was identified in CCExtractor up to 183. This affects the function parse_PAT/parse_PMT in the library src/lib_ccx/ts_tables.c of the component MPEG-TS File Parser. Such manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The name of the patch is fd7271bae238ccb3ae8a71304ea64f0886324925. It is best practice to apply a patch to resolve this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in CCExtractor up to 183. This affects the function parse_PAT/parse_PMT in the library src/lib_ccx/ts_tables.c of the component MPEG-TS File Parser. Such manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The name of the patch is fd7271bae238ccb3ae8a71304ea64f0886324925. It is best practice to apply a patch to resolve this issue. | |
| Title | CCExtractor MPEG-TS File ts_tables.c parse_PMT out-of-bounds | |
| Weaknesses | CWE-119 CWE-125 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T19:02:10.417Z
Reserved: 2026-02-09T12:10:11.207Z
Link: CVE-2026-2245
No data.
Status : Received
Published: 2026-02-09T20:15:59.270
Modified: 2026-02-09T20:15:59.270
Link: CVE-2026-2245
No data.
OpenCVE Enrichment
No data.