CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
58.6%
An exploitable integer overflow vulnerability exists within the MPEG-4
decoding functionality of the GPAC Project on Advanced Content library
v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when
the library encounters an atom using the βtfraβ FOURCC code due to
unchecked arithmetic resulting in a heap-based buffer overflow that causes
memory corruption. An attacker can convince a user to open a video to
trigger this vulnerability.
github.com/gpac/gpac/commit/b515fd04f5f00f4a99df741042f1efb31ad56351
github.com/gpac/gpac/issues/1814
launchpad.net/bugs/cve/CVE-2021-21849
nvd.nist.gov/vuln/detail/CVE-2021-21849
security-tracker.debian.org/tracker/CVE-2021-21849
talosintelligence.com/vulnerability_reports/TALOS-2021-1297
www.cve.org/CVERecord?id=CVE-2021-21849
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
58.6%