CVE-2024-6062

A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*

History

25 Sep 2024, 16:13

Type Values Removed Values Added
References () https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd - () https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd - Patch
References () https://github.com/gpac/gpac/issues/2872 - () https://github.com/gpac/gpac/issues/2872 - Exploit, Third Party Advisory
References () https://github.com/user-attachments/files/15801126/poc2.zip - () https://github.com/user-attachments/files/15801126/poc2.zip - Exploit
References () https://vuldb.com/?ctiid.268790 - () https://vuldb.com/?ctiid.268790 - Permissions Required
References () https://vuldb.com/?id.268790 - () https://vuldb.com/?id.268790 - Third Party Advisory
References () https://vuldb.com/?submit.356314 - () https://vuldb.com/?submit.356314 - Third Party Advisory
First Time Gpac gpac
Gpac
CPE cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*
CVSS v2 : 1.7
v3 : 3.3
v2 : 1.7
v3 : 5.5

18 Jun 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problemática. La función swf_svg_add_iso_sample del archivo src/filters/load_text.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulación conduce a la desreferencia del puntero nulo. El ataque debe abordarse localmente. El exploit ha sido divulgado al público y puede utilizarse. El parche se identifica como 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. Se recomienda aplicar un parche para solucionar este problema. VDB-268790 es el identificador asignado a esta vulnerabilidad.

17 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 20:15

Updated : 2024-09-25 16:13


NVD link : CVE-2024-6062

Mitre link : CVE-2024-6062

CVE.ORG link : CVE-2024-6062


JSON object : View

Products Affected

gpac

  • gpac
CWE
CWE-476

NULL Pointer Dereference