First published: Fri Jan 14 2022(Updated: )
GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function shift_chunk_offsets.isra().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45764 has been classified as a medium severity vulnerability due to its potential to cause an invalid memory address dereference.
To mitigate CVE-2021-45764, upgrade GPAC to version 1.1.1 or later as recommended in the security updates.
CVE-2021-45764 specifically affects GPAC version 1.1.0, as well as earlier versions up to 0.5.2-426-gc5ad4e4+dfsg5-5.
The impact of CVE-2021-45764 can lead to application crashes and potential exploitation by malicious entities affecting system security.
CVE-2021-45764 requires local access to exploit, but it can be leveraged in untrusted environments where the software is used.