CVE-2024-6061

A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*

History

25 Sep 2024, 16:16

Type Values Removed Values Added
First Time Gpac
Gpac gpac
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*
References () https://vuldb.com/?submit.356308 - () https://vuldb.com/?submit.356308 - Third Party Advisory
References () https://vuldb.com/?ctiid.268789 - () https://vuldb.com/?ctiid.268789 - Permissions Required
References () https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c - () https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c - Patch
References () https://github.com/gpac/gpac/issues/2871 - () https://github.com/gpac/gpac/issues/2871 - Exploit, Third Party Advisory
References () https://github.com/user-attachments/files/15801058/poc1.zip - () https://github.com/user-attachments/files/15801058/poc1.zip - Exploit
References () https://vuldb.com/?id.268789 - () https://vuldb.com/?id.268789 - Third Party Advisory

17 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 20:15

Updated : 2024-09-25 16:16


NVD link : CVE-2024-6061

Mitre link : CVE-2024-6061


JSON object : View

Products Affected

gpac

  • gpac
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')