Out-of-Bounds Affecting gpac4ios Open this link in a new tab package, versions >=0.0.0
Attack Complexity
Low
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-COCOAPODS-GPAC4IOS-1567342
-
published
19 Aug 2021
-
disclosed
19 Aug 2021
-
credit
Cisco Talos
Introduced: 19 Aug 2021
CVE-2021-21858 Open this link in a new tabHow to fix?
There is no fixed version for GPAC4iOS
.
Overview
GPAC4iOS is a GPAC4iOS is the libgpac library packaged for iOS as a Pod. It is preconfigured and tested to do a single task: create a MP4 file from a raw H.264 and an audio track.
Affected versions of this package are vulnerable to Out-of-Bounds. The function used by the library in order to read the contents of an atom using the url
FOURCC code will first check that the 64-atom size is non-zero, and then at line 30 will truncate the atom size to 32-bits when allocating space on the heap. After reading the contents of the atom using the 32-bit truncated size, the function will then use the original 64-bit size when accessing the allocated heap buffer. Due to the allocated size being truncated to 32-bits, this can result in an out-of-bounds read on 64-bit platforms.