Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24578

Опубликовано: 14 мар. 2022
Источник: debian

Описание

GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed2.0.0+dfsg1-2package
gpacend-of-lifebusterpackage
gpacend-of-lifestretchpackage

Примечания

  • https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11/

  • https://github.com/gpac/gpac/commit/b5741da08e88e8dcc8da0a7669b92405b9862850 (v2.0.0)

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.

CVSS3: 7.8
nvd
почти 4 года назад

GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.

CVSS3: 7.8
github
почти 4 года назад

GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.