Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-23269

Опубликовано: 22 сент. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed1.0.1+dfsg1-2package
gpacend-of-lifebusterpackage
gpacend-of-lifestretchpackage

Примечания

  • https://github.com/gpac/gpac/issues/1482

  • Fixed by fixes for related bugs, no specific commit identified upstream

  • poc tested with 1.0.1+dfsg1-4+deb11u1

  • https://github.com/gpac/gpac/commit/e4ed32bf56fc02fb8a04b9e13f4d7bdae2b3ae12 (v0.9.0-preview)

EPSS

Процентиль: 37%
0.00161
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.

CVSS3: 5.5
nvd
больше 4 лет назад

An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.

github
больше 3 лет назад

An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.

CVSS3: 6.5
fstec
больше 4 лет назад

Уязвимость функции stbl_GetSampleSize компонента isomedia/stbl_read.c мультимедийной платформы GPAC, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 37%
0.00161
Низкий