CVE-2024-6061

A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*

History

25 Sep 2024, 16:16

Type Values Removed Values Added
CVSS v2 : 1.7
v3 : 3.3
v2 : 1.7
v3 : 5.5
First Time Gpac gpac
Gpac
References () https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c - () https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c - Patch
References () https://github.com/gpac/gpac/issues/2871 - () https://github.com/gpac/gpac/issues/2871 - Exploit, Third Party Advisory
References () https://github.com/user-attachments/files/15801058/poc1.zip - () https://github.com/user-attachments/files/15801058/poc1.zip - Exploit
References () https://vuldb.com/?ctiid.268789 - () https://vuldb.com/?ctiid.268789 - Permissions Required
References () https://vuldb.com/?id.268789 - () https://vuldb.com/?id.268789 - Third Party Advisory
References () https://vuldb.com/?submit.356308 - () https://vuldb.com/?submit.356308 - Third Party Advisory
CPE cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*

18 Jun 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problemática. La función isoffin_process del archivo src/filters/isoffin_read.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulación conduce a un bucle infinito. Es posible lanzar el ataque al servidor local. El exploit ha sido divulgado al público y puede utilizarse. El identificador del parche es 20c0f29139a82779b86453ce7f68d0681ec7624c. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asignó el identificador VDB-268789.

17 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 20:15

Updated : 2024-09-25 16:16


NVD link : CVE-2024-6061

Mitre link : CVE-2024-6061

CVE.ORG link : CVE-2024-6061


JSON object : View

Products Affected

gpac

  • gpac
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')