Описание
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
Ссылки
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*
EPSS
Процентиль: 32%
0.00123
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 5.5
ubuntu
больше 4 лет назад
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
CVSS3: 5.5
debian
больше 4 лет назад
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stb ...
github
больше 3 лет назад
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
EPSS
Процентиль: 32%
0.00123
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787