{"id":"CVE-2026-4185","details":"A vulnerability was found in GPAC up to 2.5-DEV-rev2167-gcc9d617c0-master. This vulnerability affects the function swf_def_bits_jpeg of the file src/scene_manager/swf_parse.c of the component MP4Box. The manipulation of the argument szName results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The patch is identified as 8961c74f87ae3fe2d3352e622f7730ca96d50cf1. A patch should be applied to remediate this issue.","modified":"2026-04-10T05:43:08.752511Z","published":"2026-03-16T14:19:59.700Z","references":[{"type":"WEB","url":"https://vuldb.com/?submit.769840"},{"type":"WEB","url":"https://github.com/PeterXukt/test_pocs/blob/main/gpac/test.swf"},{"type":"WEB","url":"https://github.com/gpac/gpac/"},{"type":"WEB","url":"https://vuldb.com/?ctiid.351091"},{"type":"WEB","url":"https://vuldb.com/?id.351091"},{"type":"REPORT","url":"https://github.com/gpac/gpac/issues/3436"},{"type":"FIX","url":"https://github.com/gpac/gpac/commit/8961c74f87ae3fe2d3352e622f7730ca96d50cf1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gpac/gpac","events":[{"introduced":"0"},{"fixed":"8961c74f87ae3fe2d3352e622f7730ca96d50cf1"}]}],"versions":["abi-12","abi-12.16","abi-12.17","abi-12.18","abi-12.19","abi-12.20","abi-12.21","abi-12.22","abi-12.23","abi-12.24","abi-12.25","abi-12.26","abi-12.27","abi-13","abi-13.0","abi-14","abi-14.0","abi-15","abi-15.0","abi-15.1","abi-15.2","abi-16","abi-16.2","abi-16.3","abi-16.4","abi-16.5","testtag0.1","v0.5.2","v0.6.0","v0.9.0","v0.9.0-preview","v1.0.0","v2.0.0","v2.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-4185.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}