First published: Wed Aug 18 2021(Updated: )
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input at “stss” decoder can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ccextractor | <=0.87+ds1-1<=0.88+ds1-1 | 0.94+ds1-2 |
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21852 has been classified as a high severity vulnerability due to its potential for exploitation through crafted MPEG-4 files.
To remediate CVE-2021-21852, users should upgrade the GPAC Project on Advanced Content library to versions 0.94+ds1-2 or higher.
CVE-2021-21852 includes multiple exploitable integer overflow vulnerabilities within the MPEG-4 decoding functionality.
CVE-2021-21852 affects versions of the GPAC library and certain packages like ccextractor up to version 0.88+ds1-1.
Yes, CVE-2021-21852 can potentially be exploited remotely if a user processes a specially crafted MPEG-4 file.