First published: Mon Jun 17 2024(Updated: )
A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC | =2.5-dev-rev288-g11067ea92-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6061 is classified as a problematic vulnerability due to the potential for infinite loops.
To fix CVE-2024-6061, update to the latest version of GPAC that addresses this vulnerability.
CVE-2024-6061 affects GPAC versions 2.5-dev-rev288-g11067ea92-master.
The vulnerable component in CVE-2024-6061 is MP4Box, specifically the function isoffin_process.
CVE-2024-6061 leads to an infinite loop when the vulnerable function is executed.