GPAC heap-based buffer overflow | CVE-2023-4754
NAME
__________
GPAC heap-based buffer overflow
Platforms Affected:
GPAC GPAC 2.3-DEV-revrelease
Risk Level:
5.9
Exploitability:
Proof of Concept
Consequences:
Gain Access
DESCRIPTION
__________
GPAC is vulnerable to a heap-based buffer overflow, caused by improper bounds checking in function swf_def_font scene_manager/swf_parse.c. By sending a specially crafted payload, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS 3.0 Information
__________
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Access Vector:
Local
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.