Vulnerability Description
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
CVSS Score
7.8
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gpac | Gpac | < 2.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4Patch
- https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9ExploitPatchThird Party Advisory
- https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4Patch
- https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9ExploitPatchThird Party Advisory
FAQ
What is CVE-2023-1655?
CVE-2023-1655 is a vulnerability with a CVSS score of 7.8 (HIGH). Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
How severe is CVE-2023-1655?
CVE-2023-1655 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1655?
Check the references section above for vendor advisories and patch information. Affected products include: Gpac Gpac.