First published: Thu Jan 05 2023(Updated: )
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47091 is classified as a high-severity vulnerability due to its potential for buffer overflow exploitation.
To mitigate CVE-2022-47091, upgrade GPAC to a version above 2.2.0 or apply the necessary patches provided by your distribution.
CVE-2022-47091 affects GPAC software versions earlier than 2.2.1, specifically those below 2.2.0.
CVE-2022-47091 is a buffer overflow vulnerability found in the gf_text_process_sub function of the filters/load_text.c file in GPAC.
Yes, CVE-2022-47091 can potentially be exploited remotely if an attacker can send specially crafted input to the application.