Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-21848

Опубликовано: 25 авг. 2021
Источник: debian
EPSS Низкий

Описание

An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed1.0.1+dfsg1-5package
gpacnot-affectedbusterpackage
gpacnot-affectedstretchpackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297

  • https://github.com/gpac/gpac/commit/b515fd04f5f00f4a99df741042f1efb31ad56351

  • https://github.com/gpac/gpac/issues/1814

EPSS

Процентиль: 48%
0.00245
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 4 лет назад

An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.

CVSS3: 8.8
nvd
больше 4 лет назад

An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.

CVSS3: 8.8
github
больше 3 лет назад

An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость декодера stz2 функционала декодирования MPEG-4 мультимедийной платформы GPAC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 48%
0.00245
Низкий