漏洞信息详情
GPAC 缓冲区错误漏洞
漏洞简介
GPAC是一款开源的多媒体框架。
GPAC 0.7.2及之前版本中的libgpac_static.a静态链接库的scene_manager.c文件的‘gf_sm_load_init’函数存在缓冲区溢出漏洞。远程攻击者可诱使用户打开特制文件利用该漏洞在系统上执行任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
参考网址
来源:MISC
链接:https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/02/msg00040.html
来源:UBUNTU
链接:https://usn.ubuntu.com/3926-1/
来源:github.com
链接:https://github.com/gpac/gpac/issues/1186ExploitThird Party Advisory
来源:github.com
链接:https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658PatchThird Party Advisory
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/02/msg00040.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152306/Ubuntu-Security-Notice-USN-3926-1.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/GPAC-multiple-vulnerabilities-28618
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/76210
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2018-20761
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...