
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in gpac 0.8.0 where the strdup function in box_code_base.c contains a heap-based buffer over-read vulnerability. The vulnerability was disclosed and tracked as CVE-2020-19750 (NVD, Debian Tracker).
The vulnerability exists in the txtc_Read function within box_code_base.c at line 8637. The issue occurs when the strdup function is called on a string that is full without a null terminator, leading to a heap-based buffer over-read condition. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 HIGH with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can result in reading beyond the bounds of allocated memory, which may lead to exposure of sensitive information or potentially cause a system crash. This type of buffer over-read vulnerability can compromise system stability and potentially leak memory contents (CWE).
The issue has been fixed in subsequent versions of gpac. For Debian systems, the fix is available in version 1.0.1+dfsg1-4+deb11u3 for the bullseye release (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."