CVE-2022-24575

7.8 HIGH

📋 TL;DR

CVE-2022-24575 is a stack-based buffer overflow vulnerability in GPAC's MP4Box tool that allows attackers to execute arbitrary code or cause denial of service. This affects users who process untrusted MP4 files with GPAC version 1.0.1. The vulnerability can be triggered through specially crafted media files.

💻 Affected Systems

Products:
  • GPAC
  • MP4Box
Versions: GPAC 1.0.1 specifically
Operating Systems: Linux, Windows, macOS, All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GPAC 1.0.1 version. Earlier and later versions may have different vulnerabilities but this specific CVE is for 1.0.1.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the user running MP4Box, potentially leading to full system compromise.

🟠

Likely Case

Application crash (denial of service) when processing malicious files, with potential for code execution in some scenarios.

🟢

If Mitigated

Limited to denial of service if proper sandboxing or privilege separation is implemented.

🌐 Internet-Facing: MEDIUM - Requires user interaction to process malicious files, but MP4Box might be used in web services processing uploaded media.
🏢 Internal Only: MEDIUM - Internal users could be tricked into processing malicious files, but requires local access or social engineering.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub issues. Exploitation requires user to process a malicious MP4 file, which can be delivered via email, web downloads, or other file sharing methods.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GPAC 1.1.0 and later

Vendor Advisory: https://github.com/gpac/gpac/issues/2058

Restart Required: No

Instructions:

1. Upgrade GPAC to version 1.1.0 or later. 2. Download from official GPAC repository. 3. Recompile or use updated binaries. 4. Replace existing MP4Box installation.

🔧 Temporary Workarounds

Disable MP4Box processing of untrusted files

all

Restrict MP4Box usage to trusted files only and implement input validation

Run MP4Box with reduced privileges

all

Execute MP4Box in a sandboxed environment or with minimal user privileges

sudo -u nobody mp4box [options] (Linux)
runas /user:lowprivilegeuser mp4box.exe (Windows)

🧯 If You Can't Patch

  • Implement strict file upload validation for any service using MP4Box
  • Run MP4Box in containerized or virtualized environments with no network access

🔍 How to Verify

Check if Vulnerable:

Check GPAC version: mp4box -version | grep 'GPAC'

Check Version:

mp4box -version

Verify Fix Applied:

Verify version is 1.1.0 or later: mp4box -version

📡 Detection & Monitoring

Log Indicators:

  • MP4Box segmentation faults
  • Abnormal process termination of mp4box
  • Large memory allocation failures

Network Indicators:

  • Unusual file uploads to services using MP4Box
  • MP4 files with abnormal structure or size

SIEM Query:

process_name='mp4box' AND (event_id='1000' OR exit_code='0xC0000005')

🔗 References

📤 Share & Export