First published: Thu Feb 16 2023(Updated: )
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-0866.
The severity level of CVE-2023-0866 has not been provided in the information available.
The affected software for CVE-2023-0866 is the GitHub repository gpac/gpac prior to version 2.3.0-DEV.
To fix the heap-based buffer overflow vulnerability in gpac/gpac, update to version 2.3.0-DEV or later.
More information about CVE-2023-0866 can be found on the following references: [Reference 1](https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f), [Reference 2](https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937), [Reference 3](https://github.com/gpac/gpac/commit/518ae69dbbdb46c8443431dac9e9489aa0b78882)