CVE-2022-24249

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24249
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24249.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24249
Downstream
Published
2022-02-04T19:15:08Z
Modified
2025-10-16T05:14:31.116418Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtraboxwrite function in /boxcodebase.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.

References

Affected packages

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "target": {
                "function": "gf_cfg_init",
                "file": "src/utils/os_config_init.c"
            },
            "signature_type": "Function",
            "source": "https://github.com/gpac/gpac/commit/418db4149af78773815b5f6a7030a120037ba140",
            "deprecated": false,
            "digest": {
                "length": 2924.0,
                "function_hash": "331609225902553284938660782849123559724"
            },
            "id": "CVE-2022-24249-00ec9c94"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "src/utils/os_config_init.c"
            },
            "signature_type": "Line",
            "source": "https://github.com/gpac/gpac/commit/418db4149af78773815b5f6a7030a120037ba140",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "253854454906731252594870579307233588965",
                    "179864446493625039430457959093405636565",
                    "157047988769606476955262936216865999399",
                    "25205688373900634743508465492002274847"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-24249-84a001c2"
        },
        {
            "signature_version": "v1",
            "target": {
                "function": "PrintUsage",
                "file": "applications/mp4client/main.c"
            },
            "signature_type": "Function",
            "source": "https://github.com/gpac/gpac/commit/418db4149af78773815b5f6a7030a120037ba140",
            "deprecated": false,
            "digest": {
                "length": 1136.0,
                "function_hash": "116287927203832314234354772323596679187"
            },
            "id": "CVE-2022-24249-abddd526"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "applications/mp4client/main.c"
            },
            "signature_type": "Line",
            "source": "https://github.com/gpac/gpac/commit/418db4149af78773815b5f6a7030a120037ba140",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "110287411499135302499254568127786275886",
                    "196881605958314966606044579045527764763",
                    "211928352066196418331258856473204866912",
                    "280195963159516847825224043850516008460"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-24249-dde39a3b"
        }
    ]
}