Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20161

Опубликовано: 31 дек. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed1.0.1+dfsg1-2package
gpacno-dsabusterpackage
gpacno-dsastretchpackage
ccextractorfixed0.93+ds2-1package
ccextractorno-dsabullseyepackage
ccextractorno-dsabusterpackage

Примечания

  • https://github.com/gpac/gpac/issues/1320

  • https://github.com/gpac/gpac/commit/7a09732d4978586e6284e84caa9c301b2fa5e956

EPSS

Процентиль: 62%
0.0043
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 6 лет назад

An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.

CVSS3: 5.5
nvd
около 6 лет назад

An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.

CVSS3: 5.5
github
больше 3 лет назад

An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.

EPSS

Процентиль: 62%
0.0043
Низкий