CVE-2026-2889
Publication date 21 February 2026
Last updated 27 February 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| ccextractor | 25.10 questing | Not in release |
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2026-2889
- https://github.com/CCExtractor/ccextractor/issues/2055
- https://github.com/CCExtractor/ccextractor/pull/2057
- https://github.com/CCExtractor/ccextractor/
- https://github.com/CCExtractor/ccextractor/commit/fd7271bae238ccb3ae8a71304ea64f0886324925
- https://github.com/CCExtractor/ccextractor/releases/tag/v0.96.6
- https://github.com/oneafter/0123/blob/main/cc3/repro
- https://vuldb.com/?ctiid.347182
- https://vuldb.com/?id.347182
- https://vuldb.com/?submit.755029