
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in GPAC 1.0.1 that involves a heap-based buffer overflow vulnerability. The vulnerability was identified and assigned CVE-2021-36584. The affected component is the GPAC multimedia framework, specifically impacting version 1.0.1 of the software (Debian Tracker).
The vulnerability manifests as a heap-based buffer overflow in the gprtpbuilderdotx3g function, located in the ietf/rtppck3gpp.c file at line 399. The issue occurs during the processing of RTP packets, specifically when handling TX3G (text track) data. The vulnerability can be triggered when processing certain malformed input files through the MP4Box utility (GitHub Issue).
When exploited, this heap-based buffer overflow vulnerability could potentially lead to memory corruption, which might result in program crashes or potential arbitrary code execution. The vulnerability affects the core functionality of GPAC's media processing capabilities (Debian Tracker).
Users should upgrade to a version of GPAC that contains the fix for this vulnerability. The issue has been identified and tracked in the Debian security tracker, though specific patch information is not publicly available (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."