
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
GPAC mp4box version 1.1.0-DEV-rev1759-geb2d1e6dd contains a heap-buffer-overflow vulnerability in the function gfisomappleenumtag. This vulnerability was discovered in February 2022 and affects the MP4Box component of GPAC (NVD, MITRE).
The vulnerability exists in the gfisomappleenumtag function located in src/isomedia/isom_read.c. When processing certain MP4 files, the function performs a read operation that exceeds the allocated buffer size, specifically reading 1 byte beyond a 5-byte allocated region at address 0x6020000014f5. This heap-buffer-overflow was detected by AddressSanitizer during testing (GitHub Issue).
A successful exploitation of this vulnerability could lead to memory corruption, potentially resulting in program crashes or arbitrary code execution. The vulnerability affects the MP4Box component, which is a key tool in GPAC for manipulating MP4 files.
Users should upgrade to a version of GPAC that contains the fix for this vulnerability. If upgrading is not immediately possible, users should exercise caution when processing untrusted MP4 files with the MP4Box tool.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”