CVE-2021-33361

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-33361
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33361.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-33361
Downstream
Published
2021-09-13T20:15:08Z
Modified
2025-10-15T13:03:55.553900Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Memory leak in the afraboxread function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.

References

Affected packages

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "id": "CVE-2021-33361-2a794e70",
        "source": "https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f",
        "signature_version": "v1",
        "target": {
            "file": "src/isomedia/box_code_adobe.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "173257933732895657791454856072550826614",
                "335272942177535874662589193357733262801",
                "325158472612267962414184621803428462934",
                "251320005709277231234078755258523288097",
                "288378636506204222685295060043339577644",
                "336729436209302758293688035213458080050",
                "78358940734272799868297090819371091041",
                "309287822199362503481384769860411503329",
                "256896105000039859550390821306006879784",
                "33365563588096817325450385196559786397",
                "18803994370916686041898023545193148103",
                "104951466860376530318190474253865623106",
                "83226274969225481578923699586586262345",
                "162590810915219860779888630376840113288",
                "165543997710540366462314263695688073375",
                "215383182475346542705963808831546610224"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2021-33361-526fa629",
        "source": "https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f",
        "signature_version": "v1",
        "target": {
            "function": "mp4box_cleanup",
            "file": "applications/mp4box/main.c"
        },
        "digest": {
            "function_hash": "73015870715061305347187311939351552826",
            "length": 2834.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2021-33361-b22a6461",
        "source": "https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f",
        "signature_version": "v1",
        "target": {
            "function": "afra_box_read",
            "file": "src/isomedia/box_code_adobe.c"
        },
        "digest": {
            "function_hash": "122312135528555279617764607133896215776",
            "length": 1876.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "id": "CVE-2021-33361-b9b19e16",
        "source": "https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f",
        "signature_version": "v1",
        "target": {
            "file": "applications/mp4box/main.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "44677966355079213415483734452131210546",
                "277717650748245688562838150451199775608",
                "164442005580115004913675099071449988250",
                "313641165189259567567760258612648201704"
            ]
        },
        "deprecated": false
    }
]