Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35979

Опубликовано: 21 апр. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed1.0.1+dfsg1-4package
gpacno-dsabusterpackage
gpacno-dsastretchpackage

Примечания

  • https://github.com/gpac/gpac/commit/b15020f54aff24aaeb64b80771472be8e64a7adc

  • https://github.com/gpac/gpac/issues/1662

EPSS

Процентиль: 51%
0.00275
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.

CVSS3: 7.8
nvd
почти 5 лет назад

An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.

github
больше 3 лет назад

An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.

EPSS

Процентиль: 51%
0.00275
Низкий