Page 48 of 312 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input at “stss” decoder can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. Se presentan múltiples vulnerabilidades de desbordamiento de enteros explotables dentro de la funcionalidad MPEG-4 decoding de GPAC Project on Advanced Content library versión v1.0.1. Una entrada MPEG-4 especialmente diseñada en el decodificador "stss" puede causar un desbordamiento de enteros debido a una aritmética no comprobada, resultando en un desbordamiento del búfer en la región heap de la memoria que causa una corrupción de memoria. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 https://www.debian.org/security/2023/dsa-5411 https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. When processing the 'hdlr' FOURCC code, a specially crafted MPEG-4 input can cause an improper memory allocation resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. Se presenta una vulnerabilidad de truncamiento de enteros explotable dentro de la funcionalidad MPEG-4 decoding de la biblioteca GPAC Project en Advanced Content versión v1.0.1. Cuando se procesa el código FOURCC "hdlr", una entrada MPEG-4 especialmente diseñada puede causar una asignación de memoria inapropiada resultando en un desbordamiento del búfer en la región heap de la memoria que causa una corrupción de la memoria. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 https://www.debian.org/security/2021/dsa-4966 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an improper memory allocation resulting in a heap-based buffer overflow that causes memory corruption. The FOURCC code, 'trik', is parsed by the function within the library. An attacker can convince a user to open a video to trigger this vulnerability. Se presenta una vulnerabilidad de truncamiento de enteros explotable dentro de la funcionalidad MPEG-4 decoding de la biblioteca GPAC Project en Advanced Content versión v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 https://www.debian.org/security/2021/dsa-4966 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The stri_box_read function is used when processing atoms using the 'stri' FOURCC code. An attacker can convince a user to open a video to trigger this vulnerability. Se presenta una vulnerabilidad de truncamiento de enteros explotable dentro de la funcionalidad MPEG-4 decoding de la biblioteca GPAC Project en Advanced Content versión v1.0.1. La función stri_box_read es usada cuando se procesan átomos usando el código FOURCC "stri". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 https://www.debian.org/security/2021/dsa-4966 • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. La función Media_RewriteODFrame en GPAC versión 1.0.1, permite a atacantes causar una denegación de servicio (desreferencia del puntero NULL) por medio de un archivo diseñado en el comando MP4Box • https://github.com/gpac/gpac/commit/f0ba83717b6e4d7a15a1676d1fe06152e199b011 https://github.com/gpac/gpac/issues/1772 • CWE-476: NULL Pointer Dereference •