A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876 | Patch |
https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac | Exploit Third Party Advisory |
Configurations
History
19 Nov 2024, 15:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876 - Patch | |
References | () https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:gpac:gpac:2.3.0-dev:*:*:*:*:*:*:* | |
First Time |
Gpac
Gpac gpac |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 11:15
Updated : 2024-11-19 15:54
NVD link : CVE-2023-4679
Mitre link : CVE-2023-4679
CVE.ORG link : CVE-2023-4679
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-416
Use After Free