Description
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.
References (3)
Core 3
Core References
Patch, Third Party Advisory
https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a
Exploit, Issue Tracking, Third Party Advisory
https://github.com/gpac/gpac/issues/1876
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5411
Scores
CVSS v3
5.5
EPSS
0.0008
EPSS Percentile
24.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (1)
gpac/gpac
< 1.0.1
Published
Jun 08, 2022
Tracked Since
Feb 18, 2026