CVE-2023-0770Stack-based Buffer Overflow in Gpac

Severity
7.8HIGHNVD
EPSS
0.0%
top 87.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9
Latest updateFeb 10

Description

Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDgpac/gpac< 2.2.0
debiandebian/gpac< gpac 1.0.1+dfsg1-4+deb11u2 (bullseye)
CVEListV5gpac/gpac_gpacunspecified2.2
Debiangpac/gpac< 1.0.1+dfsg1-4+deb11u2

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5p6c-7q82-x6c9: Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 22023-02-10
OSV
CVE-2023-0770: Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 22023-02-09

📋Vendor Advisories

1
Debian
CVE-2023-0770: gpac - Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2023
CVE-2023-0770 — Stack-based Buffer Overflow in Gpac | cvebase