First published: Tue Jun 28 2022(Updated: )
In GPAC MP4Box 1.1.0, there is a Null pointer reference in the function gf_filter_pid_get_packet function in src/filter_core/filter_pid.c:5394, as demonstrated by GPAC. This can cause a denial of service (DOS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40944 is classified as a denial of service vulnerability because it can cause application crashes.
To address CVE-2021-40944, users should upgrade to GPAC version 1.1.0 or later.
CVE-2021-40944 specifically affects GPAC version 1.1.0.
CVE-2021-40944 is triggered by a null pointer reference in the gf_filter_pid_get_packet function.
Yes, CVE-2021-40944 can be exploited remotely, potentially leading to service disruption.