GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a heap-use-after-free via the gf_bs_align function at bitstream.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted file.
References
Link | Resource |
---|---|
https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8 | Third Party Advisory |
https://github.com/gpac/gpac/issues/2537 | Exploit Issue Tracking |
https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8 | Third Party Advisory |
https://github.com/gpac/gpac/issues/2537 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2023-08-28 19:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39562
Mitre link : CVE-2023-39562
CVE.ORG link : CVE-2023-39562
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-416
Use After Free