Severity
7.8HIGHNVD
GHSA9.8
EPSS
0.2%
top 58.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 25
Latest updateJul 21

Description

MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/gpac< gpac 1.0.1+dfsg1-4+deb11u2 (bullseye)
Debiangpac/gpac< 1.0.1+dfsg1-4+deb11u2
CVEListV5gpac/gpacgpac 2.0.0
NVDgpac/gpac2.0.0
npmnodejs/undici< 5.8.0

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
GHSA
undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect2022-07-21
GHSA
GHSA-vxc8-cmfv-782q: MP4Box is a component of GPAC-22022-04-26
OSV
CVE-2022-1441: MP4Box is a component of GPAC-22022-04-25

📋Vendor Advisories

1
Debian
CVE-2022-1441: gpac - MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package ...2022
CVE-2022-1441 — Debian Gpac vulnerability | cvebase