Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v4pj-7x97-8hjm

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.

An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.

EPSS

Процентиль: 55%
0.00324
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 6 лет назад

An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.

CVSS3: 5.5
nvd
почти 6 лет назад

An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.

CVSS3: 5.5
debian
почти 6 лет назад

An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstr ...

EPSS

Процентиль: 55%
0.00324
Низкий