First published: Fri Jan 14 2022(Updated: )
GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45762 has a severity level that can lead to a Denial of Service (DoS) due to an invalid memory address dereference.
CVE-2021-45762 affects GPAC version 1.1.0 and earlier, as well as specific Debian package versions up to 0.5.2-426-gc5ad4e4+dfsg5-5.
To fix CVE-2021-45762, update GPAC to version 1.1.1 or later, or upgrade to the recommended Debian package versions.
CVE-2021-45762 primarily causes Denial of Service, but does not allow for remote code execution or system exploitation.
As of now, there have been no public reports of active exploitation related to CVE-2021-45762.