A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://vuldb.com/?id.223293 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.223293 | signature third party advisory vdb entry permissions required |
https://github.com/gpac/gpac/issues/2388 | third party advisory issue tracking exploit |
https://github.com/xxy1126/Vuln/blob/main/gpac/3 | exploit |