GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md | third party advisory exploit |
https://github.com/gpac/gpac/issues/2713 | issue tracking exploit patch |