A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb | Patch Third Party Advisory | 
| https://vuldb.com/?id.213463 | Permissions Required Third Party Advisory VDB Entry | 
| https://www.debian.org/security/2023/dsa-5411 | |
| https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb | Patch Third Party Advisory | 
| https://vuldb.com/?id.213463 | Permissions Required Third Party Advisory VDB Entry | 
| https://www.debian.org/security/2023/dsa-5411 | 
Configurations
                    History
                    21 Nov 2024, 07:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
| References | () https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb - Patch, Third Party Advisory | |
| References | () https://vuldb.com/?id.213463 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://www.debian.org/security/2023/dsa-5411 - | 
07 Nov 2023, 03:52
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
27 May 2023, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-404 | |
| References | 
 | 
Information
                Published : 2022-11-11 16:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3957
Mitre link : CVE-2022-3957
CVE.ORG link : CVE-2022-3957
JSON object : View
Products Affected
                gpac
- gpac
