A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/gpac/gpac/issues/1900 | third party advisory issue tracking exploit |
https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30 | third party advisory patch |
https://www.debian.org/security/2023/dsa-5411 | vendor advisory |