First published: Wed Aug 25 2021(Updated: )
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when decoding the atom associated with the “csgp” FOURCC can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21835 has a high severity rating due to its potential for exploitation via integer overflow during MPEG-4 decoding.
To fix CVE-2021-21835, update the GPAC software to a version beyond 1.0.1 where this vulnerability has been addressed.
CVE-2021-21835 affects the GPAC Project on Advanced Content library version 1.0.1.
CVE-2021-21835 is an integer overflow vulnerability that occurs specifically in the MPEG-4 decoding functionality.
Yes, CVE-2021-21835 can be exploited remotely through specially crafted MPEG-4 input files.