First published: Tue Nov 29 2022(Updated: )
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC MP4Box | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45202 is classified as a high severity vulnerability due to the potential for a stack overflow.
To mitigate CVE-2022-45202, update GPAC to version 1.0.1+dfsg1-4+deb11u3 or later.
CVE-2022-45202 affects GPAC versions up to 2.2.0 and is resolved in later versions.
CVE-2022-45202 is a stack overflow vulnerability found in the dimC_box_read function.
Yes, CVE-2022-45202 can be exploited remotely if an attacker can manipulate the input to the affected function.