First published: Thu Aug 05 2021(Updated: )
An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-36584 is considered high due to its potential to cause denial of service.
To fix CVE-2021-36584, users should upgrade to a newer version of GPAC that addresses the heap-based buffer overflow vulnerability.
CVE-2021-36584 affects GPAC version 1.0.1.
The impact of CVE-2021-36584 includes potential denial of service in applications using the GPAC library.
Yes, CVE-2021-36584 can potentially be exploited remotely through crafted media files.