CVE-2023-1448

EUVD-2023-23698
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VulDBCNA
5.3 MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
Affected Products (NVD)
VendorProductVersion
gpacgpac
2.3:dev
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gpac
bullseye
1.0.1+dfsg1-4+deb11u3
fixed
bullseye (security)
1.0.1+dfsg1-4+deb11u3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gpac
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
dne
noble
needs-triage
oracular
dne
trusty
ignored
xenial
needs-triage