Vulnerability Details : CVE-2023-0841
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087.
Vulnerability category: Overflow
Products affected by CVE-2023-0841
- cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-0841
1.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0841
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | 2024-02-29 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-0841
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: cna@vuldb.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-0841
-
https://github.com/gpac/gpac/issues/2396
heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 · Issue #2396 · gpac/gpac · GitHub
-
https://vuldb.com/?ctiid.221087
Login requiredPermissions Required;Third Party Advisory
-
https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4
fix 3602a5de to take bytes_skipped into account (#2396) · gpac/gpac@851560e · GitHub
-
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3
poc/mp3_dmx_process_poc3 at main · qianshuidewajueji/poc · GitHubExploit
-
https://github.com/gpac/gpac/releases/tag/v2.2.1
Release GPAC 2.2.1 · gpac/gpac · GitHub
-
https://github.com/advisories/GHSA-w52x-cp47-xhhw
A vulnerability, which was classified as critical, has... · CVE-2023-0841 · GitHub Advisory Database · GitHub
-
https://vuldb.com/?id.221087
Login requiredThird Party Advisory
Jump to