First published: Fri Feb 04 2022(Updated: )
Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC | ||
GPAC MP4Box | <1.1.0 | |
Debian | =11.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4043 is classified as a high severity vulnerability due to its potential to cause a denial-of-service condition.
To fix CVE-2021-4043, upgrade the GPAC library to version 1.1.0 or later.
CVE-2021-4043 affects users of GPAC versions prior to 1.1.0.
CVE-2021-4043 is a null pointer dereference vulnerability.
CVE-2021-4043 requires local access to exploit the null pointer dereference vulnerability.