dimC_Read in isomedia/box_code_3gpp.c in GPAC from 0.5.2 to 0.8.0 has a stack-based buffer overflow.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/blob/v0.5.2/src/isomedia/box_code_3gpp.c#L1100 | |
https://github.com/gpac/gpac/commit/bcfcb3e90476692fe0d2bb532ea8deeb2a77580e | |
https://github.com/gpac/gpac/issues/1348 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html | Mailing List Third Party Advisory |
https://github.com/gpac/gpac/issues/1348 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html | Mailing List Third Party Advisory |
Configurations
History
05 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) dimC_Read in isomedia/box_code_3gpp.c in GPAC from 0.5.2 to 0.8.0 has a stack-based buffer overflow. |
Information
Published : 2020-01-02 14:16
Updated : 2025-03-05 23:15
NVD link : CVE-2019-20208
Mitre link : CVE-2019-20208
CVE.ORG link : CVE-2019-20208
JSON object : View
Products Affected
gpac
- gpac
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write