First published: Mon Dec 30 2019(Updated: )
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =0.8.0 | |
GPAC MP4Box | =0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20160 has a high severity due to the potential for remote code execution through a stack-based buffer overflow.
To fix CVE-2019-20160, update GPAC to a version later than 0.9.0 that addresses this vulnerability.
CVE-2019-20160 affects GPAC versions 0.8.0 and 0.9.0-development-20191109.
Yes, CVE-2019-20160 can potentially be exploited remotely if the vulnerable GPAC software is deployed.
As of now, the recommended solution for CVE-2019-20160 is to upgrade to a patched version of GPAC.