
Cloud Vulnerability DB
A community-led vulnerabilities database
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_dump_vrml_sffield function at /lib/libgpac.so. The vulnerability was discovered on July 4, 2023 (GitHub Issue).
The vulnerability manifests as a SEGV (segmentation violation) on unknown address 0x000000000003(0x000000000009) in the gf_dump_vrml_sffield function. The issue occurs during MPEG-4 BIFS Scene Parsing when attempting to read from an invalid memory address that points to the zero page. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) (NVD).
The vulnerability can lead to software crashes, protection mechanism bypass, memory modification, and potentially remote code execution. When triggered, it causes the application to abort due to undefined behavior in memory access (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."