Description
A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.
References (3)
Core 3
Core References
Patch, Third Party Advisory
https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb
Permissions Required, Third Party Advisory, VDB Entry
https://vuldb.com/?id.213463
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5411
Scores
CVSS v3
4.3
EPSS
0.0008
EPSS Percentile
23.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-401
CWE-404
Status
published
Products (1)
gpac/gpac
< 2.2.0
Published
Nov 11, 2022
Tracked Since
Feb 18, 2026