An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an improper memory allocation resulting in a heap-based buffer overflow that causes memory corruption. The FOURCC code, trik, is parsed by the function within the library. An attacker can convince a user to open a video to trigger this vulnerability.
When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gpac | Gpac | 1.0.1 (including) | 1.0.1 (including) |
Gpac | Ubuntu | bionic | * |
Gpac | Ubuntu | hirsute | * |
Gpac | Ubuntu | impish | * |
Gpac | Ubuntu | kinetic | * |
Gpac | Ubuntu | lunar | * |
Gpac | Ubuntu | trusty | * |
Gpac | Ubuntu | xenial | * |