An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It allows an attacker to cause Code Execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/knik0/faad2/issues/56 | issue tracking exploit third party advisory |
https://www.debian.org/security/2022/dsa-5109 | third party advisory vendor advisory |