First published: Wed Aug 18 2021(Updated: )
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked addition arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21856 has a high severity due to potential remote code execution from an integer overflow.
To fix CVE-2021-21856, update to the latest version of the GPAC library that addresses this vulnerability.
CVE-2021-21856 affects GPAC version 1.0.1 and prior versions.
CVE-2021-21856 can facilitate heap-based buffer overflow attacks leading to potential code execution.
There are no known workarounds for CVE-2021-21856; upgrading the software is recommended.