First published: Tue Oct 12 2021(Updated: )
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-22675 is classified as a high severity vulnerability due to the potential for a denial of service attack.
To fix CVE-2020-22675, upgrade to a version of gpac that is newer than 0.8.0.
CVE-2020-22675 is a heap-based buffer overflow vulnerability.
CVE-2020-22675 specifically affects gpac version 0.8.0.
While CVE-2020-22675 is primarily a denial of service vulnerability, it can potentially lead to instability or data loss depending on the exploitation.