CVE-2026-5673
Received Received - Intake
Heap-Based Out-of-Bounds Read in libtheora AVI Parser Causes DoS

Publication date: 2026-04-06

Last updated on: 2026-05-01

Assigner: Red Hat, Inc.

Description
A flaw was found in libtheora. This heap-based out-of-bounds read vulnerability exists within the AVI (Audio Video Interleave) parser, specifically in the avi_parse_input_file() function. A local attacker could exploit this by tricking a user into opening a specially crafted AVI file containing a truncated header sub-chunk. This could lead to a denial-of-service (application crash) or potentially leak sensitive information from the heap.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-05-01
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
xiph theora *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5673 is a heap-based out-of-bounds read vulnerability in the libtheora library's AVI parser, specifically in the avi_parse_input_file() function. It occurs when the parser processes a malformed AVI file containing a truncated header sub-chunk called hdrl, particularly the strh sub-chunk. The vulnerability arises because the code does not properly check the length of the data before accessing fixed offsets, leading to reading beyond the allocated buffer.

This flaw can cause the application to crash (denial-of-service) or potentially leak sensitive information from the heap.


How can this vulnerability impact me? :

An attacker can exploit this vulnerability by tricking a user into opening a specially crafted AVI file with a truncated header sub-chunk. This can lead to the application crashing, resulting in a denial-of-service condition.

Additionally, there is a potential risk of leaking sensitive information from the heap due to the out-of-bounds read.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the libtheora AVI parser with specially crafted malformed AVI files containing truncated hdrl sub-chunks, particularly the strh sub-chunk.

A practical detection method involves using a test harness that opens a potentially malformed AVI file to trigger the vulnerability and observe if a heap-buffer-overflow occurs.

For example, running the provided minimal test harness that calls AVI_open_input_file() on a crafted file such as "avilib_hdrl_short_strh.avi" can reveal the issue.

Using AddressSanitizer (ASan) during testing can help detect the heap-buffer-overflow read caused by this vulnerability.

  • Compile libtheora with AddressSanitizer enabled.
  • Run a command similar to: ./test_harness avilib_hdrl_short_strh.avi
  • Monitor ASan output for heap-buffer-overflow errors during the parsing.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include validating and sanitizing AVI files before processing them with libtheora to avoid malformed or truncated hdrl sub-chunks.

Specifically, ensure that the AVI parser performs strict bounds checking before accessing nested hdrl chunk fields.

  • Verify that at least 8 bytes remain before reading any nested hdrl chunk header.
  • Confirm that the declared chunk length fits entirely within the hdrl_data buffer.
  • For strh and strf sub-chunks, ensure sufficient remaining bytes exist before accessing fixed offsets such as +4, +14, +16, +20, +24, or +32.
  • Abort parsing immediately upon detecting malformed or truncated sub-chunks to prevent out-of-bounds reads.

Additionally, applying any available patches or updates from libtheora that address this issue is recommended.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-5673 involves a heap-based out-of-bounds read vulnerability in libtheora's AVI parser that can lead to denial-of-service or potential leakage of sensitive information from the heap.

The potential leakage of sensitive information could impact compliance with data protection regulations such as GDPR or HIPAA, which require safeguarding personal and sensitive data against unauthorized access or disclosure.

If exploited, this vulnerability might result in unauthorized exposure of sensitive information, thereby posing a risk to compliance with these standards.

However, the primary impact described is denial-of-service, and the extent of sensitive data exposure is not detailed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart