A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
References
Link Resource
https://github.com/gpac/gpac/issues/2388 Exploit Issue Tracking Third Party Advisory
https://github.com/xxy1126/Vuln/blob/main/gpac/3 Exploit
https://vuldb.com/?ctiid.223293 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.223293 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-03-17T06:43:19.758Z

Updated: 2023-10-21T08:57:25.810Z

Reserved: 2023-03-17T06:42:52.099Z


Link: CVE-2023-1448

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-03-17T07:15:12.093

Modified: 2024-05-17T02:18:06.203


Link: CVE-2023-1448

JSON object: View

cve-icon Redhat Information

No data.

CWE