Description
gpac v2.2.1 was discovered to contain a Use-After-Free (UAF) vulnerability via the dasher_configure_pid function at /src/filters/dasher.c.
References (1)
Core 1
Core References
Exploit, Third Party Advisory
https://github.com/yinluming13579/gpac_defects/blob/main/gpac_2.md
Scores
CVSS v3
7.5
EPSS
0.0022
EPSS Percentile
44.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-416
Status
published
Products (1)
gpac/gpac
2.2.1
Published
Feb 05, 2024
Tracked Since
Feb 18, 2026