First published: Wed Aug 25 2021(Updated: )
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “trun” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC MP4Box | =1.0.1 | |
Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21850 is considered a high severity vulnerability due to its potential for exploitation through specially crafted MPEG-4 inputs.
To mitigate CVE-2021-21850, you should update to GPAC version 0.5.2-426-gc5ad4e4+dfsg5-5, 1.0.1+dfsg1-4+deb11u3, or 2.2.1+dfsg1-3.
CVE-2021-21850 affects the GPAC library versions prior to the patched versions mentioned.
Exploiting CVE-2021-21850 could allow an attacker to execute arbitrary code on the affected system through the vulnerable MPEG-4 decoding functionality.
There is no officially recognized workaround for CVE-2021-21850; upgrading to a secure version is the recommended solution.