First published: Fri Mar 17 2023(Updated: )
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC GPAC | =2.3-dev | |
=2.3-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-1452.
The title of the vulnerability is GPAC load_text.c buffer overflow.
The severity of CVE-2023-1452 is high (7.8).
GPAC versions 2.3-DEV and 0.5.2-426-gc5ad4e4+dfsg5-5 are affected by CVE-2023-1452.
To fix CVE-2023-1452, update your GPAC software to version 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.