
Cloud Vulnerability DB
A community-led vulnerabilities database
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b was discovered to contain a heap use-after-free vulnerability in the m2tsdmxdeclarepid function located at filters/dmx_m2ts.c:470. The vulnerability was reported on December 11, 2022 (GitHub Issue).
The vulnerability occurs in the m2tsdmxdeclarepid function when processing MPEG-2 TS streams. The issue manifests as a heap use-after-free condition where memory is accessed after being freed, specifically at address 0x607000004548. The bug is triggered during the processing of Program Map Table (PMT) sections in MPEG-2 transport streams (GitHub Issue).
The heap use-after-free vulnerability could potentially lead to program crashes, causing denial of service (DoS) conditions. In some cases, such vulnerabilities can also lead to arbitrary code execution, though this has not been explicitly confirmed for this specific issue (GitHub Issue).
The vulnerability affects GPAC MP4box version 2.1-DEV-rev574-g9d5bb184b. Users should update to a patched version of the software when available. No specific workarounds have been publicly documented (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."