A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://vuldb.com/?id.221087 | vdb entry third party advisory technical description |
https://vuldb.com/?ctiid.221087 | permissions required signature third party advisory |
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 | exploit |
https://github.com/advisories/GHSA-w52x-cp47-xhhw | |
https://github.com/gpac/gpac/releases/tag/v2.2.1 | |
https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4 | |
https://github.com/gpac/gpac/issues/2396 |