First published: Thu Jan 13 2022(Updated: )
The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40570 has a high severity rating due to its potential to cause denial of service and allow code execution.
To fix CVE-2021-40570, upgrade to GPAC version 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.
CVE-2021-40570 affects GPAC version 1.0.1 and versions up to 0.5.2-426-gc5ad4e4+dfsg5-5.
Exploiting CVE-2021-40570 can lead to denial of service, arbitrary code execution, and potential privilege escalation.
Yes, the known mitigation for CVE-2021-40570 is to apply the relevant software updates to GPAC.