CVE-2021-21859Integer Overflow to Buffer Overflow in Gpac

Severity
8.8HIGHNVD
EPSS
0.6%
top 30.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 16
Latest updateMay 24

Description

An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The stri_box_read function is used when processing atoms using the 'stri' FOURCC code. An attacker can convince a user to open a video to trigger this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/gpac< gpac 1.0.1+dfsg1-4+deb11u1 (bullseye)
Debiangpac/gpac< 1.0.1+dfsg1-4+deb11u1
NVDgpac/gpac1.0.1

Also affects: Debian Linux 11.0

🔴Vulnerability Details

2
GHSA
GHSA-vh5q-v342-6m3c: An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v12022-05-24
OSV
CVE-2021-21859: An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v12021-08-16

📋Vendor Advisories

1
Debian
CVE-2021-21859: gpac - An exploitable integer truncation vulnerability exists within the MPEG-4 decodin...2021

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Multiple integer overflow vulnerabilities in GPAC Project on Advanced Content2021-08-13
Talos
Vulnerability Spotlight: Multiple integer overflow vulnerabilities in GPAC Project on Advanced Content2021-08-13
CVE-2021-21859 — Integer Overflow to Buffer Overflow | cvebase