GPAC up to 1.0.1 Exception reframe_nalu.c naludmx_enqueue_or_dispatch denial of service

A vulnerability has been found in GPAC up to 1.0.1 and classified as problematic. This vulnerability affects the function naludmx_enqueue_or_dispatch of the file reframe_nalu.c of the component Exception Handler. Applying the patch 5dd71c7201a3e5cf40732d585bfb21c906c171d3 is able to eliminate this problem. The bugfix is ready for download at github.com.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

121

Field

source_cve_nvd_summary1
vulnerability_cvss3_vuldb_a1
source_cve1
countermeasure_patch_url1
countermeasure_patch_name1

Commit Conf

90%28
50%14
70%1

Approve Conf

90%28
80%14
70%1
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1205019401/15/2022VulD...cve_nvd_summaryA Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service.cve.mitre.org01/15/2022accepted
70
1203844401/13/2022VulD...price_0day$0-$5ksee exploit price documentation01/13/2022accepted
90
1203844301/13/2022VulD...cvss3_meta_tempscore3.4see CVSS documentation01/13/2022accepted
90
1203844201/13/2022VulD...cvss3_meta_basescore3.5see CVSS documentation01/13/2022accepted
90
1203844101/13/2022VulD...cvss3_vuldb_tempscore3.4see CVSS documentation01/13/2022accepted
90
1203844001/13/2022VulD...cvss3_vuldb_basescore3.5see CVSS documentation01/13/2022accepted
90
1203843901/13/2022VulD...cvss2_vuldb_tempscore2.0see CVSS documentation01/13/2022accepted
90
1203843801/13/2022VulD...cvss2_vuldb_basescore2.3see CVSS documentation01/13/2022accepted
90
1203843701/13/2022VulD...cvss3_vuldb_eXderived from historical data01/13/2022accepted
80
1203843601/13/2022VulD...cvss3_vuldb_uiNderived from historical data01/13/2022accepted
80
1203843501/13/2022VulD...cvss3_vuldb_prLderived from historical data01/13/2022accepted
80
1203843401/13/2022VulD...cvss3_vuldb_acLderived from historical data01/13/2022accepted
80
1203843301/13/2022VulD...cvss3_vuldb_avAderived from historical data01/13/2022accepted
80
1203843201/13/2022VulD...cvss2_vuldb_eNDderived from historical data01/13/2022accepted
80
1203843101/13/2022VulD...cvss2_vuldb_auSderived from historical data01/13/2022accepted
80
1203843001/13/2022VulD...cvss2_vuldb_acMderived from historical data01/13/2022accepted
80
1203842901/13/2022VulD...cvss2_vuldb_avAderived from historical data01/13/2022accepted
80
1203842801/13/2022VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector01/13/2022accepted
80
1203842701/13/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector01/13/2022accepted
80
1203842601/13/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector01/13/2022accepted
80

23 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!