Heap-based Buffer Overflow Affecting gpac/gpac package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.05% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GPACGPAC-6042531
  • published6 Nov 2023
  • disclosed1 Nov 2023
  • creditZeng Yunxiang, Song Jiaxuan

Introduced: 1 Nov 2023

CVE-2023-46931  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the ffdmx_parse_side_data function. An attacker can exploit this vulnerability by sending specially crafted data. This could lead to unexpected application behavior, including denial of service.

CVSS Scores

version 3.1