An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_process_pmt in media_tools/mpegts.c:2163 that can cause a denial of service (DOS) via a crafted MP4 file.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/commit/8c5e847185d74462d674ee7d28fb46c29dae6dd2 | Patch |
https://github.com/gpac/gpac/issues/1421 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
27 Jun 2025, 19:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:* | |
First Time |
Gpac gpac
Gpac |
|
References | () https://github.com/gpac/gpac/commit/8c5e847185d74462d674ee7d28fb46c29dae6dd2 - Patch | |
References | () https://github.com/gpac/gpac/issues/1421 - Exploit, Issue Tracking, Vendor Advisory |
24 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
24 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-24 14:15
Updated : 2025-06-27 19:34
NVD link : CVE-2024-57184
Mitre link : CVE-2024-57184
CVE.ORG link : CVE-2024-57184
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')