An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The stri_box_read function is used when processing atoms using the stri FOURCC code. An attacker can convince a user to open a video to trigger this vulnerability.
The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gpac | Gpac | 1.0.1 (including) | 1.0.1 (including) |
Gpac | Ubuntu | bionic | * |
Gpac | Ubuntu | hirsute | * |
Gpac | Ubuntu | impish | * |
Gpac | Ubuntu | kinetic | * |
Gpac | Ubuntu | lunar | * |
Gpac | Ubuntu | trusty | * |
Gpac | Ubuntu | trusty/esm | * |
Gpac | Ubuntu | xenial | * |