
Cloud Vulnerability DB
A community-led vulnerabilities database
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b was discovered to contain a buffer overflow vulnerability in the gf_vvc_read_sps_bs_internal function located in media_tools/av_parsers.c. The vulnerability was assigned CVE-2022-47089 and was disclosed on December 12, 2022 (MITRE).
The vulnerability exists in the gf_vvc_read_sps_bs_internal function where a buffer overflow occurs when processing reference picture lists. Specifically, when the loop counter 'j' reaches 64, it causes an overflow of the sps->rps array. The issue was identified with GPAC version 2.1-DEV-rev574-g9d5bb184b-master. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 HIGH with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
The buffer overflow vulnerability could potentially lead to denial of service (DoS) conditions or remote code execution (RCE). The high CVSS score indicates that successful exploitation could result in complete compromise of confidentiality, integrity, and availability of the affected system (NVD).
The vulnerability affects versions up to (excluding) GPAC 2.2.0. Users should upgrade to GPAC version 2.2.0 or later to address this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."