← Back to CVEs
CVE-2024-6061
LOW3.3
Description
A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
CVE Details
CVSS v3.1 Score3.3
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/17/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
gpac:gpac
Weaknesses (CWE)
CWE-835
References
https://github.com/gpac/gpac/issues/2871(cna@vuldb.com)
https://github.com/user-attachments/files/15801058/poc1.zip(cna@vuldb.com)
https://vuldb.com/?ctiid.268789(cna@vuldb.com)
https://vuldb.com/?id.268789(cna@vuldb.com)
https://vuldb.com/?submit.356308(cna@vuldb.com)
https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/gpac/gpac/issues/2871(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/user-attachments/files/15801058/poc1.zip(af854a3a-2127-422b-91ae-364da2661108)
https://vuldb.com/?ctiid.268789(af854a3a-2127-422b-91ae-364da2661108)
https://vuldb.com/?id.268789(af854a3a-2127-422b-91ae-364da2661108)
https://vuldb.com/?submit.356308(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.