Vulnerability Details : CVE-2019-20628
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2019-20628
- cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20628
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20628
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2019-20628
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20628
-
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
fixed potential crash on PMT IOD parse - cf #1268 #1269 · gpac/gpac@1ab4860 · GitHubPatch;Third Party Advisory
-
https://github.com/gpac/gpac/issues/1269
Use After Free (mpegts.c:2183) · Issue #1269 · gpac/gpac · GitHubExploit;Third Party Advisory
-
https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8
be stricter in PAT processing - cf #1269 · gpac/gpac@98b7276 · GitHubPatch;Third Party Advisory
Jump to