Home

Description

A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is 442e2299530138d8f874fd885c565ba98a6318ba. It is suggested to install a patch to address this issue.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-08 | Updated 2026-05-08 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

Allocation of Resources

Resource Consumption

Timeline

2026-05-07:Advisory disclosed
2026-05-07:VulDB entry created
2026-05-07:VulDB entry last update

Credits

Lucian-2333 (VulDB User) reporter

References

vuldb.com/vuln/361914 (VDB-361914 | GPAC box_code_base.c sidx_box_read allocation of resources) vdb-entry technical-description

vuldb.com/vuln/361914/cti (VDB-361914 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/808611 (Submit #808611 | gpac latest Denial of Service (DoS)) third-party-advisory

github.com/gpac/gpac/issues/3519 exploit issue-tracking

github.com/...ommit/442e2299530138d8f874fd885c565ba98a6318ba patch

github.com/gpac/gpac/ product

cve.org (CVE-2026-8124)

nvd.nist.gov (CVE-2026-8124)

Download JSON