First published: Thu Jan 13 2022(Updated: )
A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40568 is classified as a high severity buffer overflow vulnerability that can lead to denial of service and potential code execution.
To mitigate CVE-2021-40568, upgrade GPAC to version 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.
CVE-2021-40568 affects GPAC versions up to and including 1.0.1.
Yes, CVE-2021-40568 can allow attackers to escalate privileges through code execution.
CVE-2021-40568 is associated with a buffer overflow attack that exploits malformed MP4 files.