Buffer Overflow vulnerability in GPAC version 2.5 allows a local attacker to execute arbitrary code.
References
| Link | Resource |
|---|---|
| https://github.com/gpac/gpac/commit/74e26b8dfeb0ab8c7317603b80a18306d0698473 | Patch |
| https://github.com/gpac/gpac/issues/3089 | Exploit Issue Tracking |
| https://github.com/gpac/gpac/issues/3089 | Exploit Issue Tracking |
Configurations
History
25 Sep 2025, 13:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gpac/gpac/commit/74e26b8dfeb0ab8c7317603b80a18306d0698473 - Patch | |
| References | () https://github.com/gpac/gpac/issues/3089 - Exploit, Issue Tracking | |
| CPE | cpe:2.3:a:gpac:gpac:2.5:*:*:*:*:*:*:* | |
| First Time |
Gpac
Gpac gpac |
03 Apr 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Mar 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-120 | |
| References | () https://github.com/gpac/gpac/issues/3089 - | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
| Summary |
|
28 Feb 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-28 23:15
Updated : 2025-09-25 13:27
NVD link : CVE-2025-25723
Mitre link : CVE-2025-25723
CVE.ORG link : CVE-2025-25723
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
