Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-1448

Опубликовано: 17 мар. 2023
Источник: nvd
CVSS3: 5.3
CVSS3: 7.8
CVSS2: 4.3
EPSS Низкий

Описание

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*

EPSS

Процентиль: 7%
0.0003
Низкий

5.3 Medium

CVSS3

7.8 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-122

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

CVSS3: 5.3
debian
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPA ...

CVSS3: 7.8
github
больше 2 лет назад

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

CVSS3: 7.8
fstec
больше 2 лет назад

Уязвимость функции gf_m2ts_process_sdt() мультимедийной платформы GPAC, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
redos
11 месяцев назад

Множественные уязвимости gpac

EPSS

Процентиль: 7%
0.0003
Низкий

5.3 Medium

CVSS3

7.8 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-122