Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-36584

Опубликовано: 05 авг. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed2.0.0+dfsg1-2package
gpacignoredbullseyepackage
gpacignoredbusterpackage
gpacignoredstretchpackage

Примечания

  • https://github.com/gpac/gpac/issues/1842

  • https://github.com/gpac/gpac/commit/13442ec1c401a4181ba6d7f79c27df6054c817c7 (v2.0.0)

EPSS

Процентиль: 30%
0.00111
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).

CVSS3: 5.5
nvd
больше 4 лет назад

An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).

github
больше 3 лет назад

An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).

EPSS

Процентиль: 30%
0.00111
Низкий