Vulnerability Description
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gpac | Gpac | 2.3-dev-rev566-g50c2ab06f-master |
Related Weaknesses (CWE)
References
- https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1bPatch
- https://github.com/gpac/gpac/issues/2613ExploitIssue Tracking
- https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1bPatch
- https://github.com/gpac/gpac/issues/2613ExploitIssue Tracking
FAQ
What is CVE-2023-48014?
CVE-2023-48014 is a vulnerability with a CVSS score of 7.8 (HIGH). GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
How severe is CVE-2023-48014?
CVE-2023-48014 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48014?
Check the references section above for vendor advisories and patch information. Affected products include: Gpac Gpac.