4.3
CVSSv2

CVE-2021-4043

Published: 04/02/2022 Updated: 27/05/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

NULL Pointer Dereference in GitHub repository gpac/gpac before 1.1.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gpac gpac

Vendor Advisories

Multiple issues were found in GPAC multimedia framework, which could result in denial of service or potentially the execution of arbitrary code For the stable distribution (bullseye), these problems have been fixed in version 101+dfsg1-4+deb11u2 We recommend that you upgrade your gpac packages For the detailed security status of gpac please re ...

Github Repositories

CVE-2021-4034

CVE-2021-4043 A memory corruption vulnerability was discovered in pkexec of polkit (previously PolicyKit) Reference beny23githubio/posts/pwnkit_how_to_check_and_exploit/ beaglesecuritycom/blog/vulnerability/pwnkit-linux-system-bug-allowing-distro-root-accesshtml thehackernewscom/2022/01/12-year-old-polkit-flaw-letshtml

PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit

Background Last week, a significant vulnerability in polkit’s pkexec was publicly disclosed (link) By exploiting this vulnerability, attackers on a vulnerable host could easily gain full root privileges from any unprivileged user Following the public disclosure of this “PwnKit” vulnerability, we developed simple scripts to detect and check if a scanned host