CVE-2021-21837
NixOS vulnerability analysis and mitigation

Overview

Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability (Talos Report).

Technical details

The vulnerability exists in the MPEG-4 decoding functionality where the library processes atoms from the container. When parsing various atom types, the library reads fields from the atom's contents and uses them to calculate boundaries of fields within the rest of the atom. The fields are explicitly trusted and used to calculate heap-buffer sizes, which can result in integer overflow or integer truncation leading to undersized heap allocations. This causes heap-based buffer overflow when reading atom contents into the undersized buffer. The vulnerability has a CVSSv3 score of 8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is classified as CWE-680 - Integer Overflow to Buffer Overflow (Talos Report).

Impact

A successful exploit of this vulnerability can result in code execution under the context of the library. The vulnerability affects the integrity of memory handling and can lead to arbitrary code execution when a specially crafted MPEG-4 file is processed (Talos Report).

Mitigation and workarounds

The vulnerability has been fixed in version 1.0.1+dfsg1-4+deb11u1 for Debian bullseye. The oldstable distribution (buster) is not affected by this vulnerability. Users are recommended to upgrade their gpac packages to the fixed version (Debian Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox-esr
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • thunderbird
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management