A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/issues/2386 | Exploit Issue Tracking Third Party Advisory |
https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4 | Exploit |
https://vuldb.com/?ctiid.223297 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.223297 | Permissions Required Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-03-17T06:50:37.037Z
Updated: 2023-10-21T09:02:18.715Z
Reserved: 2023-03-17T06:50:23.089Z
Link: CVE-2023-1452
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-17T07:15:12.947
Modified: 2024-05-17T02:18:06.653
Link: CVE-2023-1452
JSON object: View
Redhat Information
No data.
CWE