GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gfxmlparsebitsequencebs function in utils/xmlbin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements. An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36.
{
"binaries": [
{
"binary_name": "gpac",
"binary_version": "0.5.0+svn4288~dfsg1-4ubuntu1+esm2"
},
{
"binary_name": "gpac-modules-base",
"binary_version": "0.5.0+svn4288~dfsg1-4ubuntu1+esm2"
},
{
"binary_name": "libgpac2",
"binary_version": "0.5.0+svn4288~dfsg1-4ubuntu1+esm2"
}
]
}{
"binaries": [
{
"binary_name": "gpac",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1+esm2"
},
{
"binary_name": "gpac-modules-base",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1+esm2"
},
{
"binary_name": "libgpac4",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1+esm2"
}
]
}{
"binaries": [
{
"binary_name": "gpac",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1+esm1"
},
{
"binary_name": "gpac-modules-base",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1+esm1"
},
{
"binary_name": "libgpac4",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1+esm1"
}
]
}{
"binaries": [
{
"binary_name": "gpac",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-5ubuntu0.1~esm2"
},
{
"binary_name": "gpac-modules-base",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-5ubuntu0.1~esm2"
},
{
"binary_name": "libgpac4",
"binary_version": "0.5.2-426-gc5ad4e4+dfsg5-5ubuntu0.1~esm2"
}
]
}