GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/issues/2713 | Exploit Issue Tracking Patch |
https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md | Exploit Third Party Advisory |
Configurations
History
31 Jan 2024, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:* | |
References | () https://github.com/gpac/gpac/issues/2713 - Exploit, Issue Tracking, Patch | |
References | () https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-120 |
25 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-25 16:15
Updated : 2024-02-05 00:22
NVD link : CVE-2024-22749
Mitre link : CVE-2024-22749
CVE.ORG link : CVE-2024-22749
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')