{"id":"USN-3926-1","summary":"gpac vulnerabilities","details":"It was discovered that the GPAC MP4Box utility incorrectly handled certain\nmemory operations. If an user or automated system were tricked into opening a\nspecially crafted MP4 file, a remote attacker could use this issue to cause\nMP4Box to crash, resulting in a denial of service, or possibly execute\narbitrary code.\n","modified":"2026-02-10T04:41:29Z","published":"2019-03-29T13:50:53Z","related":["UBUNTU-CVE-2018-1000100","UBUNTU-CVE-2018-13005","UBUNTU-CVE-2018-13006","UBUNTU-CVE-2018-20760","UBUNTU-CVE-2018-20761","UBUNTU-CVE-2018-20762","UBUNTU-CVE-2018-20763","UBUNTU-CVE-2018-7752"],"upstream":["CVE-2018-1000100","CVE-2018-13005","CVE-2018-13006","CVE-2018-20760","CVE-2018-20761","CVE-2018-20762","CVE-2018-20763","CVE-2018-7752","UBUNTU-CVE-2018-1000100","UBUNTU-CVE-2018-13005","UBUNTU-CVE-2018-13006","UBUNTU-CVE-2018-20760","UBUNTU-CVE-2018-20761","UBUNTU-CVE-2018-20762","UBUNTU-CVE-2018-20763","UBUNTU-CVE-2018-7752"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3926-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7752"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-13005"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-13006"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20760"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20761"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20762"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20763"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000100"}],"affected":[{"package":{"name":"gpac","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gpac@0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1"}]}],"versions":["0.5.2-426-gc5ad4e4+dfsg5-1build1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1","binary_name":"gpac"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1","binary_name":"gpac-modules-base"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1","binary_name":"libgpac-dev"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-1ubuntu0.1","binary_name":"libgpac4"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-7752","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-13005","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-13006","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20760","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20761","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20762","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20763","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-1000100","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3926-1.json"}},{"package":{"name":"gpac","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gpac@0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1"}]}],"versions":["0.5.2-426-gc5ad4e4+dfsg5-3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1","binary_name":"gpac"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1","binary_name":"gpac-modules-base"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1","binary_name":"libgpac-dev"},{"binary_version":"0.5.2-426-gc5ad4e4+dfsg5-3ubuntu0.1","binary_name":"libgpac4"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-7752","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-13005","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-13006","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20760","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20761","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20762","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-20763","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-1000100","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3926-1.json"}}],"schema_version":"1.7.3"}