Description
A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
References (3)
Core 3
Core References
Patch, Third Party Advisory
https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30
Exploit, Issue Tracking, Third Party Advisory
https://github.com/gpac/gpac/issues/1900
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5411
Scores
CVSS v3
7.8
EPSS
0.0016
EPSS Percentile
36.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (1)
gpac/gpac
< 1.0.1
Published
Jan 13, 2022
Tracked Since
Feb 18, 2026