A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/issues/2388 | Exploit Issue Tracking Third Party Advisory |
https://github.com/xxy1126/Vuln/blob/main/gpac/3 | Exploit |
https://vuldb.com/?ctiid.223293 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.223293 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-03-17T06:43:19.758Z
Updated: 2023-10-21T08:57:25.810Z
Reserved: 2023-03-17T06:42:52.099Z
Link: CVE-2023-1448
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-17T07:15:12.093
Modified: 2024-05-17T02:18:06.203
Link: CVE-2023-1448
JSON object: View
Redhat Information
No data.
CWE