First published: Mon Jun 17 2024(Updated: )
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC MP4Box | =2.5-dev-rev288-g11067ea92-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6063 has been classified as a problematic vulnerability.
To fix CVE-2024-6063, update GPAC to the latest version that addresses this vulnerability.
CVE-2024-6063 is caused by a null pointer dereference in the m2tsdmx_on_event function of the MP4Box component.
CVE-2024-6063 affects GPAC version 2.5-dev-rev288-g11067ea92-master.
Exploitation of CVE-2024-6063 may require local access or specific conditions, but its details indicate it could be problematic in targeted scenarios.