First published: Mon Dec 30 2019(Updated: )
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =0.8.0 | |
GPAC MP4Box | =0.9.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20162 has a high severity due to the potential for remote code execution caused by a heap-based buffer overflow.
To fix CVE-2019-20162, upgrade GPAC to a version later than 0.9.0 or apply any available security patches from your Linux distribution.
CVE-2019-20162 affects GPAC versions 0.8.0 and 0.9.0-development-20191109.
Yes, CVE-2019-20162 is exploitable in production environments, particularly if vulnerable versions of GPAC are exposed to untrusted inputs.
CVE-2019-20162 specifically impacts the function gf_isom_box_parse_ex() in the file isomedia/box_funcs.c within GPAC.