First published: Sat Mar 12 2022(Updated: )
GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC GPAC | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26967 is a vulnerability in GPAC 2.0 that allows a heap-based buffer overflow in gf_base64_encode, which can be triggered via MP4Box.
CVE-2022-26967 is considered a critical vulnerability.
GPAC versions 0.5.2-426-gc5ad4e4+dfsg5-5, 1.0.1+dfsg1-4+deb11u1, and 2.0.0+dfsg1-4 are affected by CVE-2022-26967.
CVE-2022-26967 can be exploited by triggering a heap-based buffer overflow in gf_base64_encode, which can be done via MP4Box.
Yes, the remedy for CVE-2022-26967 is to update GPAC to version 1.0.1+dfsg1-4+deb11u3 or 2.0.0+dfsg1-4.