First published: Wed Aug 18 2021(Updated: )
Multiple exploitable integer truncation vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an improper memory allocation resulting in a heap-based buffer overflow that causes memory corruption The implementation of the parser used for the “Xtra” FOURCC code is handled. An attacker can convince a user to open a video to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21862 is considered to have a high severity due to the potential for a remote code execution via heap-based buffer overflow.
To fix CVE-2021-21862, upgrade the GPAC software to the latest version that addresses this vulnerability.
CVE-2021-21862 can be exploited through specially crafted MPEG-4 files designed to trigger integer truncation vulnerabilities.
CVE-2021-21862 affects GPAC version 1.0.1 specifically.
Exploiting CVE-2021-21862 can lead to memory corruption and may allow an attacker to execute arbitrary code on the affected system.