First published: Wed Apr 21 2021(Updated: )
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =0.8.0 | |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35979 has a critical severity rating due to its potential for exploitation through heap-based buffer overflow.
To mitigate CVE-2020-35979, users should upgrade to the latest version of GPAC that addresses the vulnerability.
CVE-2020-35979 specifically affects GPAC versions 0.8.0 and 1.0.1.
CVE-2020-35979 is a heap-based buffer overflow vulnerability found in the function gp_rtp_builder_do_avc() within GPAC.
Yes, CVE-2020-35979 can potentially be exploited remotely, making it a significant security concern.