CVE-2022-45204: n/a in n/a
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.
AI Analysis
Technical Summary
CVE-2022-45204 is a medium-severity vulnerability identified in the GPAC multimedia framework, specifically in the function dimC_box_read located in the isomedia/box_code_3gpp.c source file. GPAC is an open-source multimedia framework used for packaging, streaming, and playback of multimedia content, including support for ISO base media file formats such as MP4 and 3GPP. The vulnerability is a memory leak (CWE-401), which occurs when allocated memory is not properly released after use, leading to gradual exhaustion of system memory resources. This particular memory leak is triggered during the parsing or reading of certain 3GPP box structures within media files. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no vendor or product information is specified beyond the GPAC framework version v2.1-DEV-rev428-gcb8ae46c8-master. No patches or fixes are currently linked. The vulnerability could cause denial of service or application instability due to memory exhaustion if an attacker can induce repeated parsing of crafted media files. Given the local attack vector and requirement for user interaction, exploitation is limited to scenarios where an attacker can convince a user to open or process a malicious media file using the vulnerable GPAC version.
Potential Impact
For European organizations, the primary impact of CVE-2022-45204 is potential denial of service or application crashes in systems that utilize the vulnerable GPAC multimedia framework for media processing. This could affect media playback applications, streaming servers, or content packaging tools that rely on GPAC. While the vulnerability does not compromise confidentiality or integrity, disruption of media services could impact user experience, operational continuity, or media delivery pipelines. Sectors such as broadcasting, media production, telecommunications, and any enterprise using GPAC-based tools might experience service degradation or outages. However, the requirement for local access and user interaction limits the threat to environments where users handle untrusted media files. The absence of known exploits and the medium severity suggest a moderate risk profile. Organizations with automated media processing workflows or exposed user endpoints that handle media files should be cautious, as crafted files could trigger memory leaks leading to resource exhaustion and potential denial of service.
Mitigation Recommendations
1. Identify and inventory all systems and applications using the GPAC framework, especially versions around v2.1-DEV-rev428-gcb8ae46c8-master. 2. Monitor official GPAC repositories and security advisories for patches or updates addressing this memory leak and apply them promptly once available. 3. Implement strict input validation and sandboxing for media files processed by GPAC to limit exposure to untrusted or malicious content. 4. Restrict local user permissions to prevent unauthorized execution of media processing tools and reduce the risk of exploitation requiring local access. 5. Educate users about the risks of opening untrusted media files and enforce policies to avoid processing media from unknown sources. 6. Employ runtime memory monitoring and anomaly detection on systems running GPAC to detect unusual memory consumption patterns indicative of exploitation attempts. 7. Consider alternative multimedia frameworks or updated versions with resolved vulnerabilities for critical media processing workflows. 8. In environments where user interaction is unavoidable, implement application whitelisting and endpoint protection to reduce the risk of malicious file execution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-45204: n/a in n/a
Description
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.
AI-Powered Analysis
Technical Analysis
CVE-2022-45204 is a medium-severity vulnerability identified in the GPAC multimedia framework, specifically in the function dimC_box_read located in the isomedia/box_code_3gpp.c source file. GPAC is an open-source multimedia framework used for packaging, streaming, and playback of multimedia content, including support for ISO base media file formats such as MP4 and 3GPP. The vulnerability is a memory leak (CWE-401), which occurs when allocated memory is not properly released after use, leading to gradual exhaustion of system memory resources. This particular memory leak is triggered during the parsing or reading of certain 3GPP box structures within media files. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no vendor or product information is specified beyond the GPAC framework version v2.1-DEV-rev428-gcb8ae46c8-master. No patches or fixes are currently linked. The vulnerability could cause denial of service or application instability due to memory exhaustion if an attacker can induce repeated parsing of crafted media files. Given the local attack vector and requirement for user interaction, exploitation is limited to scenarios where an attacker can convince a user to open or process a malicious media file using the vulnerable GPAC version.
Potential Impact
For European organizations, the primary impact of CVE-2022-45204 is potential denial of service or application crashes in systems that utilize the vulnerable GPAC multimedia framework for media processing. This could affect media playback applications, streaming servers, or content packaging tools that rely on GPAC. While the vulnerability does not compromise confidentiality or integrity, disruption of media services could impact user experience, operational continuity, or media delivery pipelines. Sectors such as broadcasting, media production, telecommunications, and any enterprise using GPAC-based tools might experience service degradation or outages. However, the requirement for local access and user interaction limits the threat to environments where users handle untrusted media files. The absence of known exploits and the medium severity suggest a moderate risk profile. Organizations with automated media processing workflows or exposed user endpoints that handle media files should be cautious, as crafted files could trigger memory leaks leading to resource exhaustion and potential denial of service.
Mitigation Recommendations
1. Identify and inventory all systems and applications using the GPAC framework, especially versions around v2.1-DEV-rev428-gcb8ae46c8-master. 2. Monitor official GPAC repositories and security advisories for patches or updates addressing this memory leak and apply them promptly once available. 3. Implement strict input validation and sandboxing for media files processed by GPAC to limit exposure to untrusted or malicious content. 4. Restrict local user permissions to prevent unauthorized execution of media processing tools and reduce the risk of exploitation requiring local access. 5. Educate users about the risks of opening untrusted media files and enforce policies to avoid processing media from unknown sources. 6. Employ runtime memory monitoring and anomaly detection on systems running GPAC to detect unusual memory consumption patterns indicative of exploitation attempts. 7. Consider alternative multimedia frameworks or updated versions with resolved vulnerabilities for critical media processing workflows. 8. In environments where user interaction is unavoidable, implement application whitelisting and endpoint protection to reduce the risk of malicious file execution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-14T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf0432
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 12:43:41 PM
Last updated: 8/11/2025, 8:37:21 PM
Views: 10
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.