GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/gpac/gpac/issues/2343 | issue tracking exploit third party advisory |
https://www.debian.org/security/2023/dsa-5411 | vendor advisory |