{"id":"CVE-2021-40568","details":"A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.","modified":"2026-04-11T21:23:24.570387Z","published":"2022-01-13T18:15:07.977Z","references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5411"},{"type":"REPORT","url":"https://github.com/gpac/gpac/issues/1900"},{"type":"FIX","url":"https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gpac/gpac","events":[{"introduced":"0"},{"last_affected":"d8538e8ae946b32d99c6b2c57cbb327146e9cd9d"},{"fixed":"f1ae01d745200a258cdf62622f71754c37cb6c30"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.1"}]}}],"versions":["v0.5.2","v0.6.0","v0.7.0","v0.7.1","v0.9.0","v0.9.0-preview","v1.0.0","v1.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-40568.json","vanir_signatures_modified":"2026-04-11T21:23:24Z","vanir_signatures":[{"signature_version":"v1","source":"https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30","id":"CVE-2021-40568-29ccc687","deprecated":false,"digest":{"line_hashes":["271653455945834763208605817383398407567","108141525076181077294603074563806756805","190803646424172019847377105406717169819","89477344314601249121963044820989003834","290637595160814789406353695481930629703","63844348439704388504248188721780055958","77211956177004889184976754078166324125","93252862727952819464823552247917341008","210379992823712861008072287307593731924","164007027648911898047628708525104472158","33139317742673087143301621788696875760","71975751562691156573789078052992987280","242024803436346367085704818926588916010","299823168141144608576117028597126088114","236105253951310564318966436216071134934","110357499185969270537647273652446008653","305083598892664072296549753441583846912"],"threshold":0.9},"target":{"file":"src/media_tools/av_parsers.c"},"signature_type":"Line"},{"signature_version":"v1","source":"https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30","id":"CVE-2021-40568-48037a01","deprecated":false,"digest":{"length":1785,"function_hash":"59411885416295801732352142629685711594"},"target":{"file":"src/media_tools/av_parsers.c","function":"svc_parse_slice"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30","id":"CVE-2021-40568-e854a826","deprecated":false,"digest":{"length":761,"function_hash":"10749217417946529625503250407587877509"},"target":{"file":"src/media_tools/av_parsers.c","function":"gf_bs_read_ue_log_idx3"},"signature_type":"Function"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}