CVE-2026-1417

Source
https://cve.org/CVERecord?id=CVE-2026-1417
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1417.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1417
Downstream
Published
2026-01-26T04:16:10.180Z
Modified
2026-03-15T22:52:46.571996Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dumpisomrtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue.

References

Affected packages

Git / github.com/enocknt/gpac

Affected ranges

Type
GIT
Repo
https://github.com/enocknt/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.4.0"
        }
    ]
}

Affected versions

v0.*
v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview
v1.*
v1.0.0
v1.0.1
v2.*
v2.0.0
v2.2.0
v2.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1417.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "applications/mp4box/filedump.c"
        },
        "source": "https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "35474818441514346559164347454059341261",
                "71403141866165313361734795766190246118",
                "80931931569652790500014680581277163174",
                "234071933924367474565275121161875600785"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2026-1417-8bf960c1",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "applications/mp4box/filedump.c",
            "function": "dump_isom_rtp"
        },
        "source": "https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de",
        "deprecated": false,
        "digest": {
            "function_hash": "262678287620382324901013173267808909761",
            "length": 1109.0
        },
        "id": "CVE-2026-1417-f28efb1c",
        "signature_type": "Function"
    }
]