GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a | third party advisory patch |
https://github.com/gpac/gpac/issues/1876 | issue tracking exploit third party advisory |
https://www.debian.org/security/2023/dsa-5411 | vendor advisory |