GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS).
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/issues/1978 | Exploit Third Party Advisory |
https://www.debian.org/security/2023/dsa-5411 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-01-14T00:00:00
Updated: 2023-05-27T00:00:00
Reserved: 2021-12-27T00:00:00
Link: CVE-2021-45762
JSON object: View
NVD Information
Status : Modified
Published: 2022-01-14T19:15:08.027
Modified: 2023-05-27T04:15:18.670
Link: CVE-2021-45762
JSON object: View
Redhat Information
No data.
CWE