First published: Fri Oct 01 2021(Updated: )
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC MP4Box | =1.0.1 | |
=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41456 is classified as a denial of service vulnerability due to a stack buffer overflow.
To fix CVE-2021-41456, upgrade to a version of MP4Box that is not affected, such as version 0.5.2-426-gc5ad4e4+dfsg5 or higher.
CVE-2021-41456 affects MP4Box version 1.0.1 and similar versions in the GPAC package.
CVE-2021-41456 can be exploited by sending crafted input to the nhmldmx_send_sample() function leading to a denial of service.
While CVE-2021-41456 leads to denial of service, its criticality depends on the specific environment and usage of the affected software.