First published: Thu Jan 05 2023(Updated: )
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC GPAC | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47663 is a vulnerability in GPAC MP4box 2.1-DEV-rev649-ga8f438d20 that allows for a buffer overflow in h263dmx_process filters/reframe_h263.c:609.
CVE-2022-47663 has a severity score of 7.8 out of 10 according to the CVSS v3.1 system.
GPAC versions up to and including 1.0.1+dfsg1-4+deb11u3 are affected by CVE-2022-47663.
To fix CVE-2022-47663, update GPAC to version 1.0.1+dfsg1-4+deb11u4 or later.
You can find more information about CVE-2022-47663 at the following references: [GitHub Issue](https://github.com/gpac/gpac/issues/2360), [GitHub Commit](https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2022-47663).