The binary MP4Box in Gpac from 0.9.0-preview to 1.0.1 has a double-free vulnerability in the gf_text_get_utf8_line function in load_text.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://github.com/gpac/gpac/issues/1897 | third party advisory issue tracking exploit |
https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | third party advisory patch |
https://www.debian.org/security/2023/dsa-5411 | vendor advisory mailing list third party advisory |
https://github.com/gpac/gpac/blob/v0.9.0-preview/src/filters/load_text.c#L232 | product |
https://github.com/gpac/gpac/blob/v0.9.0-preview/src/filters/load_text.c#L304 | product |