CVE-2021-4043 in Gpac and Debian Products
Published on February 4, 2022
NULL Pointer Dereference in gpac/gpac
Known Exploited Vulnerability
This Motion Spell GPAC Null Pointer Dereference Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.
The following remediation steps are recommended / required by October 21, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2021-4043
stack.watch emails you whenever new vulnerabilities are published in Gpac or Debian Linux. Just hit a watch button to start following.
Affected Versions
gpac/gpac:- Version unspecified and below 1.1.0 is affected.
- Before 1.1.0 is affected.
- Version 11.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.