CVE-2026-4185Improper Restriction of Operations within the Bounds of a Memory Buffer in Gpac

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 75.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 16

Description

A vulnerability was found in GPAC up to 2.5-DEV-rev2167-gcc9d617c0-master. This vulnerability affects the function swf_def_bits_jpeg of the file src/scene_manager/swf_parse.c of the component MP4Box. The manipulation of the argument szName results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The patch is identified as 8961c74f87ae3fe2d3352e622f7730ca96d50cf1. A patch should be applied to remediate this issue.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages1 packages

debiandebian/gpac

🔴Vulnerability Details

2
GHSA
GHSA-2hwp-9jff-pr6q: A vulnerability was found in GPAC up to 22026-03-16
OSV
CVE-2026-4185: A vulnerability was found in GPAC up to 22026-03-16

📋Vendor Advisories

1
Debian
CVE-2026-4185: gpac - A vulnerability was found in GPAC up to 2.5-DEV-rev2167-gcc9d617c0-master. This ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-4185 Impact, Exploitability, and Mitigation Steps | Wiz