CVE-2022-1441

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1441
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1441.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1441
Downstream
Published
2022-04-25T17:15:36.547Z
Modified
2025-11-14T12:46:49.641288Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function diST_box_read() to read from video. In this function, it allocates a buffer str with fixed length. However, content read from bs is controllable by user, so is the length, which causes a buffer overflow.

References

Affected packages

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

v2.*

v2.0.0

Database specific

vanir_signatures

[
    {
        "digest": {
            "line_hashes": [
                "44897598656335622251864563474618727529",
                "74676244605543209251356328879308876131",
                "209487627963969003683465613797552657734",
                "181789870713227207800590551776769138890",
                "46047871196308465926949462385053721512",
                "155515540128536217015285225239489335676",
                "139629543009130235920786115429859115469",
                "219428159513859071163693712510745714203",
                "261277137494029647098211910788802170554",
                "180723747942048975850327907178299807350",
                "270496145043382125231193973637642546901",
                "263763921846525544194970054770287773084",
                "191248662369945428291092309020684624141",
                "144662079547371800733043166768316851892",
                "146044525011670718420397489341820271258"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "src/isomedia/box_code_3gpp.c"
        },
        "signature_type": "Line",
        "id": "CVE-2022-1441-5182d9a9",
        "signature_version": "v1",
        "source": "https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb",
        "deprecated": false
    },
    {
        "digest": {
            "length": 323.0,
            "function_hash": "185730880086337698894755163184647874134"
        },
        "target": {
            "file": "src/isomedia/box_code_3gpp.c",
            "function": "diST_box_read"
        },
        "signature_type": "Function",
        "id": "CVE-2022-1441-e7d5fe36",
        "signature_version": "v1",
        "source": "https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb",
        "deprecated": false
    }
]