First published: Thu Aug 31 2023(Updated: )
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <2.3 | |
<2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-4682.
The severity of CVE-2023-4682 is medium with a CVSS score of 5.9.
The gpac/gpac GitHub repository is affected by CVE-2023-4682.
To fix the heap-based buffer overflow in gpac/gpac, update the software to version 2.3-DEV or later.
You can find more information about CVE-2023-4682 at the following references: [Reference 1](https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be), [Reference 2](https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c).