A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue.
References
| Link | Resource |
|---|---|
| https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de | Patch |
| https://github.com/gpac/gpac/issues/3426 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/gpac/gpac/issues/3426#issue-3802172856 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.342806 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342806 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.736543 | Third Party Advisory VDB Entry |
Configurations
History
28 Jan 2026, 15:04
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gpac
Gpac gpac |
|
| CPE | cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:* | |
| References | () https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de - Patch | |
| References | () https://github.com/gpac/gpac/issues/3426 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/gpac/gpac/issues/3426#issue-3802172856 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.342806 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.342806 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.736543 - Third Party Advisory, VDB Entry |
26 Jan 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-26 04:16
Updated : 2026-01-28 15:04
NVD link : CVE-2026-1417
Mitre link : CVE-2026-1417
CVE.ORG link : CVE-2026-1417
JSON object : View
Products Affected
gpac
- gpac
