Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45820
HistoryMar 11, 2024 - 5:20 a.m.

Heap-based Buffer Overflow

2024-03-1105:20:25
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
8
libgpac.so vulnerability validation dos crafted input

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0

Percentile

9.0%

libgpac.so is vulnerable to Heap-based Buffer Overflow. The vulnerability is due to improper input size validation within the f_fwrite component function in utils/os_file.c, which allows remote attackers to execute arbitrary code or cause a Denial of Service (DoS) through crafted input.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0

Percentile

9.0%