Out-of-Bounds Affecting gpac4ios package, versions >=0.0.0
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-COCOAPODS-GPAC4IOS-1567342
- published 19 Aug 2021
- disclosed 19 Aug 2021
- credit Cisco Talos
Introduced: 19 Aug 2021
CVE-2021-21858 Open this link in a new tabHow to fix?
There is no fixed version for GPAC4iOS
.
Overview
GPAC4iOS is a GPAC4iOS is the libgpac library packaged for iOS as a Pod. It is preconfigured and tested to do a single task: create a MP4 file from a raw H.264 and an audio track.
Affected versions of this package are vulnerable to Out-of-Bounds. The function used by the library in order to read the contents of an atom using the url
FOURCC code will first check that the 64-atom size is non-zero, and then at line 30 will truncate the atom size to 32-bits when allocating space on the heap. After reading the contents of the atom using the 32-bit truncated size, the function will then use the original 64-bit size when accessing the allocated heap buffer. Due to the allocated size being truncated to 32-bits, this can result in an out-of-bounds read on 64-bit platforms.