Gpac

Gpac

351 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 05.03.2025 23:15:13

There is a integer overflow in media_tools/av_parsers.c in the hevc_parse_slice_segment function in GPAC from v0.9.0-preview to 1.0.1 which results in a crash.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 06:03:13

There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 06:03:13

In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy.

Exploit
  • EPSS 0.27%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 06:03:14

In the function gf_hevc_read_pps_bs_internal function in media_tools/av_parsers.c in GPAC 1.0.1 there is a loop, which with crafted file, pps->num_tile_columns may be larger than sizeof(pps->column_width), which results in a heap overflow in the loop...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 05.03.2025 23:15:13

There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC from 0.5.2 to 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which result...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 19.04.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 06:03:30

In filters/reframe_latm.c in GPAC 1.0.1 there is a Null Pointer Dereference, when gf_filter_pck_get_data is called. The first arg pck may be null with a crafted mp4 file,which results in a crash.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 19.04.2021 19:15:18
  • Zuletzt bearbeitet 21.11.2024 06:05:22

Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 19.04.2021 19:15:18
  • Zuletzt bearbeitet 21.11.2024 06:05:22

Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 19.04.2021 19:15:18
  • Zuletzt bearbeitet 21.11.2024 06:05:22

Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 19.04.2021 19:15:18
  • Zuletzt bearbeitet 21.11.2024 06:05:22

The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.