First published: Sat Mar 09 2024(Updated: )
An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46427 has been classified as having a high severity due to its potential for remote code execution and denial of service.
To fix CVE-2023-46427, you should update to the latest patched version of GPAC.
CVE-2023-46427 specifically affects the gf_dash_setup_period component in media_tools/dash_client.c.
Yes, CVE-2023-46427 can allow remote attackers to obtain sensitive information, increasing the risk of data breaches.
CVE-2023-46427 exploits a null pointer deference which can result in arbitrary code execution.