CVE-2021-29279Integer Overflow or Wraparound in Gpac

Severity
7.8HIGHNVD
EPSS
0.2%
top 55.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 19
Latest updateMay 24

Description

There is a integer overflow in function filter_core/filter_props.c:gf_props_assign_value in GPAC 1.0.1. In which, the arg const GF_PropertyValue *value,maybe value->value.data.size is a negative number. In result, memcpy in gf_props_assign_value failed.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/gpac< gpac 1.0.1+dfsg1-4 (bullseye)
Debiangpac/gpac< 1.0.1+dfsg1-4
NVDgpac/gpac1.0.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6wx8-5pfm-wp73: There is a integer overflow in function filter_core/filter_props2022-05-24
OSV
CVE-2021-29279: There is a integer overflow in function filter_core/filter_props2021-04-19

📋Vendor Advisories

1
Debian
CVE-2021-29279: gpac - There is a integer overflow in function filter_core/filter_props.c:gf_props_assi...2021
CVE-2021-29279 — Integer Overflow or Wraparound in Gpac | cvebase