First published: Mon Aug 28 2023(Updated: )
GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a heap-use-after-free via the gf_bs_align function at bitstream.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =2.3-2.3-dev-rev449-g5948e4f70-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39562.
The severity of CVE-2023-39562 is medium with a severity value of 5.5.
The affected software is GPAC v2.3-DEV-rev449-g5948e4f70-master with version 2.3-2.3-dev-rev449-g5948e4f70-master.
CVE-2023-39562 allows attackers to cause a Denial of Service (DoS) by supplying a crafted file.
At the moment, there is no known fix or patch available for CVE-2023-39562. It is recommended to monitor the vendor's website for updates.