A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://vuldb.com/?id.223297 | permissions required vdb entry third party advisory technical description |
https://vuldb.com/?ctiid.223297 | permissions required signature vdb entry third party advisory |
https://github.com/gpac/gpac/issues/2386 | issue tracking exploit third party advisory |
https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4 | exploit |