CVE-2023-1449

A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/gpac/gpac/issues/2387 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/xxy1126/Vuln/blob/main/gpac/2 Exploit
https://vuldb.com/?ctiid.223294 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.223294 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*

History

07 Nov 2023, 04:03

Type Values Removed Values Added
CWE CWE-415

21 Oct 2023, 09:15

Type Values Removed Values Added
References
  • {'url': 'https://www.debian.org/security/2023/dsa-5411', 'name': 'https://www.debian.org/security/2023/dsa-5411', 'tags': [], 'refsource': 'MISC'}
CWE CWE-415

27 May 2023, 04:15

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5411 -

Information

Published : 2023-03-17 07:15

Updated : 2024-05-17 02:18


NVD link : CVE-2023-1449

Mitre link : CVE-2023-1449

CVE.ORG link : CVE-2023-1449


JSON object : View

Products Affected

gpac

  • gpac
CWE
CWE-415

Double Free