7.8
CVSSv3

CVE-2023-1448

Published: 17/03/2023 Updated: 17/05/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

gpac gpac 2.3

Vendor Advisories

Debian Bug report logs - #1034187 gpac: CVE-2023-0841 CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654 CVE-2023-1655 Package: src:gpac; Maintainer for src:gpac is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Mon, 10 Apr 2023 17:48:01 ...
Multiple issues were found in GPAC multimedia framework, which could result in denial of service or potentially the execution of arbitrary code For the stable distribution (bullseye), these problems have been fixed in version 101+dfsg1-4+deb11u2 We recommend that you upgrade your gpac packages For the detailed security status of gpac please re ...