A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.
References
| Link | Resource |
|---|---|
| https://github.com/enocknt/gpac/commit/d45c264c20addf0c1cc05124ede33f8ffa800e68 | Patch |
| https://github.com/gpac/gpac/issues/3427 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://github.com/gpac/gpac/issues/3427#issue-3802197432 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://vuldb.com/?ctiid.342805 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342805 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.736542 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-26 04:16
Updated : 2026-01-28 15:18
NVD link : CVE-2026-1416
Mitre link : CVE-2026-1416
CVE.ORG link : CVE-2026-1416
JSON object : View
Products Affected
gpac
- gpac
