
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. The audio_sample_entry_Read function in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls, leading to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes (NVD).
The vulnerability exists in the audio_sample_entry_Read function within the isomedia/box_code_base.c file. The issue stems from improper handling of memory deallocation calls through gf_isom_box_del, which results in use-after-free conditions. This affects the processing of MP4 files when using the MP4Box utility (GitHub Commit).
The vulnerability can lead to various use-after-free outcomes when processing MP4 files, potentially resulting in program crashes or arbitrary code execution. The issue affects the core functionality of GPAC's media processing capabilities (NVD).
The issue has been fixed in a subsequent patch that modifies the audio_sample_entry_Read function to properly handle memory deallocation. Users should upgrade to a version of GPAC that includes this fix (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."