Description
A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac
Scores
CVSS v3
5.5
EPSS
0.0004
EPSS Percentile
12.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-416
Status
published
Products (1)
gpac/gpac
2.3.0-dev
Published
Nov 15, 2024
Tracked Since
Feb 18, 2026