Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-45762

Опубликовано: 14 янв. 2022
Источник: debian
EPSS Низкий

Описание

GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed2.0.0+dfsg1-2package
gpacend-of-lifebusterpackage
gpacend-of-lifestretchpackage

Примечания

  • https://github.com/gpac/gpac/issues/1978

  • https://github.com/gpac/gpac/commit/6d647f6e458c9b727eae1a8077d27fa433ced788 (v2.0.0)

EPSS

Процентиль: 25%
0.00088
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 4 лет назад

GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).

CVSS3: 5.5
nvd
около 4 лет назад

GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).

CVSS3: 5.5
github
около 4 лет назад

GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).

EPSS

Процентиль: 25%
0.00088
Низкий