GPAC SVG Parser svg_attributes.c svg_parse_preserveaspectratio memory leak

A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The CWE definition for the vulnerability is CWE-401. The weakness was presented 11/11/2022 as 2191e66aa7df750e8ef01781b1930bea87b713bb. It is possible to read the advisory at github.com. This vulnerability is known as CVE-2022-3957. The attack can be launched remotely. Technical details are available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment. The attack technique deployed by this issue is T1499 according to MITRE ATT&CK. It is declared as not defined. We expect the 0-day to have been worth approximately $0-$5k. The patch is named 2191e66aa7df750e8ef01781b1930bea87b713bb. The bugfix is ready for download at github.com. It is recommended to apply a patch to fix this issue. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

125

Field

exploit_price_0day2
source_cve_nvd_summary1
source_cve_assigned1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1

Commit Conf

90%32
50%10
70%2

Approve Conf

90%32
80%10
70%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1339568912/17/2022VulD...price_0day$0-$5ksee exploit price documentation12/17/2022accepted
90
1339568812/17/2022VulD...cve_nvd_summaryA vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.cve.mitre.org12/17/2022accepted
70
1339568712/17/2022VulD...cve_assigned1668121200 (11/11/2022)cve.mitre.org12/17/2022accepted
70
1325445211/11/2022VulD...price_0day$0-$5ksee exploit price documentation11/11/2022accepted
90
1325445111/11/2022VulD...cvss3_meta_tempscore4.1see CVSS documentation11/11/2022accepted
90
1325445011/11/2022VulD...cvss3_meta_basescore4.3see CVSS documentation11/11/2022accepted
90
1325444911/11/2022VulD...cvss3_vuldb_tempscore4.1see CVSS documentation11/11/2022accepted
90
1325444811/11/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation11/11/2022accepted
90
1325444711/11/2022VulD...cvss2_vuldb_tempscore4.4see CVSS documentation11/11/2022accepted
90
1325444611/11/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation11/11/2022accepted
90
1325444511/11/2022VulD...cvss3_vuldb_eXderived from historical data11/11/2022accepted
80
1325444411/11/2022VulD...cvss2_vuldb_eNDderived from historical data11/11/2022accepted
80
1325444311/11/2022VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector11/11/2022accepted
80
1325444211/11/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector11/11/2022accepted
80
1325444111/11/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector11/11/2022accepted
80
1325444011/11/2022VulD...cvss2_vuldb_iiNderived from vuldb v3 vector11/11/2022accepted
80
1325443911/11/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector11/11/2022accepted
80
1325443811/11/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector11/11/2022accepted
80
1325443711/11/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector11/11/2022accepted
80
1325443611/11/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector11/11/2022accepted
80

24 more entries are not shown

Might our Artificial Intelligence support you?

Check our Alexa App!