Vulnerability Description
GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gpac | Gpac | 2.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/shareExploitThird Party Advisory
- https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/src/uThird Party Advisory
- https://github.com/gpac/gpac/issues/2179ExploitIssue TrackingPatch
- https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/shareExploitThird Party Advisory
- https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/src/uThird Party Advisory
- https://github.com/gpac/gpac/issues/2179ExploitIssue TrackingPatch
FAQ
What is CVE-2022-30976?
CVE-2022-30976 is a vulnerability with a CVSS score of 7.1 (HIGH). GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.
How severe is CVE-2022-30976?
CVE-2022-30976 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30976?
Check the references section above for vendor advisories and patch information. Affected products include: Gpac Gpac.