GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a | Patch Third Party Advisory |
https://github.com/gpac/gpac/issues/1876 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2023/dsa-5411 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-06-08T00:00:00
Updated: 2023-05-27T00:00:00
Reserved: 2021-09-07T00:00:00
Link: CVE-2021-40592
JSON object: View
NVD Information
Status : Modified
Published: 2022-06-08T18:15:08.173
Modified: 2023-05-27T04:15:17.280
Link: CVE-2021-40592
JSON object: View
Redhat Information
No data.
CWE