CVE-2023-1452

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-1452
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1452.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-1452
Related
Published
2023-03-17T07:15:12Z
Modified
2024-09-11T04:57:10.053962Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.

References

Affected packages

Debian:11 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1+dfsg1-4+deb11u2

Affected versions

1.*

1.0.1+dfsg1-4
1.0.1+dfsg1-4+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}