CVE-2023-46932

9.8 CRITICAL

📋 TL;DR

A heap buffer overflow vulnerability in GPAC's MP4Box allows attackers to execute arbitrary code or cause denial of service by exploiting the str2ulong class in avilib.c. This affects users of GPAC version 2.3-DEV-rev617-g671976fcc-master, particularly those processing untrusted media files.

💻 Affected Systems

Products:
  • GPAC
  • MP4Box
Versions: GPAC version 2.3-DEV-rev617-g671976fcc-master
Operating Systems: Linux, Windows, macOS, Other Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the development version; stable releases may not be affected, but users should verify.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Denial of service via application crashes or limited code execution in constrained environments.

🟢

If Mitigated

Minimal impact if patched or with strict input validation and sandboxing.

🌐 Internet-Facing: HIGH, as MP4Box may process external media files from untrusted sources over networks.
🏢 Internal Only: MEDIUM, risk is lower but still present if handling malicious internal files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation likely requires crafting a malicious media file; no public proof-of-concept is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GPAC GitHub repository for updates post-rev617-g671976fcc-master

Vendor Advisory: https://github.com/gpac/gpac/issues/2669

Restart Required: No

Instructions:

1. Visit the GPAC GitHub repository. 2. Update to the latest version that includes the fix. 3. Recompile and reinstall if using source code.

🔧 Temporary Workarounds

Restrict File Processing

all

Limit MP4Box to trusted media files only and avoid processing untrusted inputs.

Use Sandboxing

linux

Run MP4Box in a sandboxed environment to contain potential exploits.

firejail --net=none mp4box [options] (Linux)
sandbox-exec -f profile.sb mp4box [options] (macOS)

🧯 If You Can't Patch

  • Disable or remove MP4Box from production systems if not essential.
  • Implement strict network and file access controls to limit exposure to untrusted media.

🔍 How to Verify

Check if Vulnerable:

Check GPAC version with 'mp4box -version' and compare to affected version 2.3-DEV-rev617-g671976fcc-master.

Check Version:

mp4box -version

Verify Fix Applied:

Update GPAC and run 'mp4box -version' to confirm version is newer than the vulnerable one.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal termination logs from MP4Box
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual outbound connections from systems running MP4Box
  • Suspicious file uploads to media processing services

SIEM Query:

source="*mp4box*" AND (event_type="crash" OR event_type="error")

🔗 References

📤 Share & Export