{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6061","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-06-17T13:34:40.380Z","datePublished":"2024-06-17T19:31:07.053Z","dateUpdated":"2024-08-01T21:25:03.228Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-06-17T19:31:07.053Z"},"title":"GPAC MP4Box isoffin_read.c isoffin_process infinite loop","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-835","lang":"en","description":"CWE-835 Infinite Loop"}]}],"affected":[{"vendor":"n/a","product":"GPAC","versions":[{"version":"2.5-DEV-rev228-g11067ea92-master","status":"affected"}],"modules":["MP4Box"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability."},{"lang":"de","value":"In GPAC 2.5-DEV-rev228-g11067ea92-master wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es die Funktion isoffin_process der Datei src/filters/isoffin_read.c der Komponente MP4Box. Durch Manipulation mit unbekannten Daten kann eine infinite loop-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 20c0f29139a82779b86453ce7f68d0681ec7624c bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P"}}],"timeline":[{"time":"2024-06-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-06-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-06-17T15:43:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Fantasy (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.268789","name":"VDB-268789 | GPAC MP4Box isoffin_read.c isoffin_process infinite loop","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.268789","name":"VDB-268789 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.356308","name":"Submit #356308 | gpac 2.5-DEV-rev228-g11067ea92-master Infinite loop in MP4Box","tags":["third-party-advisory"]},{"url":"https://github.com/gpac/gpac/issues/2871","tags":["issue-tracking"]},{"url":"https://github.com/user-attachments/files/15801058/poc1.zip","tags":["exploit"]},{"url":"https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c","tags":["patch"]}]},"adp":[{"affected":[{"vendor":"gpac","product":"gpac","cpes":["cpe:2.3:a:gpac:gpac:2.5-dev-rev228-g11067ea92-master:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.5-dev-rev228-g11067ea92-master","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-18T13:45:08.479606Z","id":"CVE-2024-6061","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-18T13:45:12.133Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:25:03.228Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.268789","name":"VDB-268789 | GPAC MP4Box isoffin_read.c isoffin_process infinite loop","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.268789","name":"VDB-268789 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.356308","name":"Submit #356308 | gpac 2.5-DEV-rev228-g11067ea92-master Infinite loop in MP4Box","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/gpac/gpac/issues/2871","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/user-attachments/files/15801058/poc1.zip","tags":["exploit","x_transferred"]},{"url":"https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c","tags":["patch","x_transferred"]}]}]}}