dimC_Read in isomedia/box_code_3gpp.c in GPAC from 0.5.2 to 0.8.0 has a stack-based buffer overflow.
References
| Link | Resource |
|---|---|
| https://github.com/gpac/gpac/blob/v0.5.2/src/isomedia/box_code_3gpp.c#L1100 | Product |
| https://github.com/gpac/gpac/commit/bcfcb3e90476692fe0d2bb532ea8deeb2a77580e | Patch |
| https://github.com/gpac/gpac/issues/1348 | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html | Mailing List Third Party Advisory |
| https://github.com/gpac/gpac/issues/1348 | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-01-02 14:16
Updated : 2025-07-11 20:06
NVD link : CVE-2019-20208
Mitre link : CVE-2019-20208
CVE.ORG link : CVE-2019-20208
JSON object : View
Products Affected
gpac
- gpac
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write
