Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-32137

Опубликовано: 13 сент. 2021
Источник: debian

Описание

Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed2.0.0+dfsg1-2package
gpacignoredbullseyepackage
gpacnot-affectedbusterpackage
gpacnot-affectedstretchpackage
ccextractorfixed0.93+ds2-1package
ccextractorno-dsabullseyepackage
ccextractorno-dsabusterpackage

Примечания

  • https://github.com/gpac/gpac/commit/328def7d3b93847d64ecb6e9e0399684e57c3eca (v2.0.0)

  • https://github.com/gpac/gpac/issues/1766

  • Support for vulnerable file type introduced in https://github.com/gpac/gpac/commit/2c65e5604b469d4a4e1a1dc0c6cbe351f2d39a17

  • Confirmed that stretch/buster versions were not affect by building with ASAN and testing POC from GitHub issue

  • the stretch/buster versions produce '[iso file] Read Box "free" failed (Invalid IsoMedia File)'

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

CVSS3: 5.5
nvd
больше 4 лет назад

Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

github
больше 3 лет назад

Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

CVSS3: 6.5
fstec
больше 4 лет назад

Уязвимость функции URL_GetProtocolType команды MP4Box мультимедийной платформы GPAC, позволяющая нарушителю вызвать отказ в обслуживании