First published: Fri Jan 21 2022(Updated: )
GPAC v1.1.0 was discovered to contain a stack overflow via the function gf_node_get_name () at scenegraph/base_scenegraph.c. This vulnerability can lead to a program crash, causing a Denial of Service (DoS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =1.1.0-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the GPAC stack overflow issue is CVE-2021-46238.
The affected software version for the GPAC stack overflow vulnerability is GPAC v1.1.0-dev.
The severity of the GPAC stack overflow vulnerability is medium (5.5).
The GPAC stack overflow vulnerability manifests as a program crash, which can lead to a Denial of Service (DoS) attack.
At the moment, there is no specific fix available for the GPAC stack overflow issue. It is recommended to update to a patched version when available or apply any vendor-supplied patches.