Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-1448

Опубликовано: 17 мар. 2023
Источник: debian
EPSS Низкий

Описание

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed2.2.1+dfsg1-1experimentalpackage
gpacfixed2.2.1+dfsg1-2package
gpacend-of-lifebusterpackage

Примечания

  • https://github.com/gpac/gpac/issues/2388

  • https://github.com/gpac/gpac/commit/8db20cb634a546c536c31caac94e1f74b778b463

  • https://github.com/gpac/gpac/commit/e76699a83a148345247a02501293b28bc62d6a2e (v2.2.1)

EPSS

Процентиль: 7%
0.0003
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

CVSS3: 5.3
nvd
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

CVSS3: 7.8
github
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

CVSS3: 7.8
fstec
больше 2 лет назад

Уязвимость функции gf_m2ts_process_sdt() мультимедийной платформы GPAC, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
redos
11 месяцев назад

Множественные уязвимости gpac

EPSS

Процентиль: 7%
0.0003
Низкий