First published: Wed Mar 07 2018(Updated: )
GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 1.0.1+dfsg1-4+deb11u3 | |
GPAC MP4Box | <=0.7.1 | |
Debian | =8.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7752 is classified as a high severity vulnerability due to the potential for buffer overflow leading to code execution.
To fix CVE-2018-7752, upgrade to GPAC version 1.0.1+dfsg1-4+deb11u3 or later.
CVE-2018-7752 affects GPAC versions up to and including 0.7.1 on various operating systems including Debian and Ubuntu.
CVE-2018-7752 involves a buffer overflow in the gf_media_avc_read_sps function, which may allow an attacker to execute arbitrary code.
Yes, CVE-2018-7752 is a different vulnerability from CVE-2018-1000100, although both involve the GPAC software.