First published: Mon Aug 16 2021(Updated: )
An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The stri_box_read function is used when processing atoms using the 'stri' FOURCC code. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC MP4Box | =1.0.1 | |
Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21859 has been classified as a high-severity vulnerability due to its potential exploitation through specially crafted video files.
To fix CVE-2021-21859, you should update the GPAC library to a patched version such as 0.5.2-426-gc5ad4e4+dfsg5-5, 1.0.1+dfsg1-4+deb11u3, or 2.2.1+dfsg1-3.
CVE-2021-21859 affects GPAC versions 1.0.1 and earlier, particularly on Debian Linux 11.0.
Yes, CVE-2021-21859 can be exploited remotely if an attacker convinces a user to open a malicious video file.
CVE-2021-21859 is an integer truncation vulnerability that affects the MPEG-4 decoding functionality of the GPAC Project.