First published: Wed Apr 21 2021(Updated: )
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is a use-after-free in the function gf_isom_box_del() in isomedia/box_funcs.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ccextractor | 0.87+ds1-1 0.88+ds1-1 0.94+ds1-2 | |
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC MP4Box | =0.8.0 | |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35980 is classified as a high severity vulnerability due to its potential to allow exploitation through a use-after-free condition.
To fix CVE-2020-35980, update to GPAC version 0.8.1 or later, or 1.0.2 or later.
CVE-2020-35980 can lead to application crashes or execution of arbitrary code, affecting the stability and security of the software.
GPAC versions 0.8.0 and 1.0.1 are affected by CVE-2020-35980 due to the use-after-free issue.
Yes, CVE-2020-35980 is considered remotely exploitable if a vulnerable version of GPAC is being used in an accessible environment.