gpac gpac CVE-2021-4043 in Gpac and Debian Products
Published on February 4, 2022

NULL Pointer Dereference in gpac/gpac

product logo product logo
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.

Vendor Advisory NVD

Known Exploited Vulnerability

This Motion Spell GPAC Null Pointer Dereference Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.

The following remediation steps are recommended / required by October 21, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weakness Type

NULL Pointer Dereference

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.


Products Associated with CVE-2021-4043

stack.watch emails you whenever new vulnerabilities are published in Gpac or Debian Linux. Just hit a watch button to start following.

 
 

Affected Versions

gpac/gpac: gpac: debian_linux:

Exploit Probability

EPSS
1.46%
Percentile
80.87%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.