Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
Weakness
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Affected Software
| Name | 
Vendor | 
Start Version | 
End Version | 
| Gpac | 
Gpac | 
1.0.1 (including) | 
1.0.1 (including) | 
| Gpac | 
Ubuntu | 
bionic | 
* | 
| Gpac | 
Ubuntu | 
focal | 
* | 
| Gpac | 
Ubuntu | 
hirsute | 
* | 
| Gpac | 
Ubuntu | 
impish | 
* | 
| Gpac | 
Ubuntu | 
kinetic | 
* | 
| Gpac | 
Ubuntu | 
lunar | 
* | 
| Gpac | 
Ubuntu | 
trusty | 
* | 
| Gpac | 
Ubuntu | 
trusty/esm | 
* | 
| Gpac | 
Ubuntu | 
xenial | 
* | 
Potential Mitigations
- Choose a language or tool that provides automatic memory management, or makes manual memory management less error-prone.
 
- For example, glibc in Linux provides protection against free of invalid pointers.
 
- When using Xcode to target OS X or iOS, enable automatic reference counting (ARC) [REF-391].
 
- To help correctly and consistently manage memory when programming in C++, consider using a smart pointer class such as std::auto_ptr (defined by ISO/IEC ISO/IEC 14882:2003), std::shared_ptr and std::unique_ptr (specified by an upcoming revision of the C++ standard, informally referred to as C++ 1x), or equivalent solutions such as Boost.
 
References