Vulnerability Description
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gpac | Gpac | 2.3 |
Related Weaknesses (CWE)
References
- https://github.com/gpac/gpac/issues/2387ExploitIssue TrackingPatch
- https://github.com/xxy1126/Vuln/blob/main/gpac/2Exploit
- https://vuldb.com/?ctiid.223294Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.223294Third Party AdvisoryVDB Entry
- https://github.com/gpac/gpac/issues/2387ExploitIssue TrackingPatch
- https://github.com/xxy1126/Vuln/blob/main/gpac/2Exploit
- https://vuldb.com/?ctiid.223294Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.223294Third Party AdvisoryVDB Entry
FAQ
What is CVE-2023-1449?
CVE-2023-1449 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. T...
How severe is CVE-2023-1449?
CVE-2023-1449 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1449?
Check the references section above for vendor advisories and patch information. Affected products include: Gpac Gpac.