A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/issues/2387 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/xxy1126/Vuln/blob/main/gpac/2 | Exploit |
https://vuldb.com/?ctiid.223294 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.223294 | Third Party Advisory VDB Entry |
Configurations
History
07 Nov 2023, 04:03
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-415 |
21 Oct 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE |
27 May 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-03-17 07:15
Updated : 2024-05-17 02:18
NVD link : CVE-2023-1449
Mitre link : CVE-2023-1449
CVE.ORG link : CVE-2023-1449
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-415
Double Free