CVE-2024-50664

7.8 HIGH

📋 TL;DR

This vulnerability is a heap buffer overflow in gpac's MP4Box tool that occurs when processing specially crafted MP4 files. Attackers could exploit this to execute arbitrary code or cause denial of service. Users of gpac 2.4 who process untrusted media files are affected.

💻 Affected Systems

Products:
  • gpac
  • MP4Box
Versions: gpac 2.4
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of gpac 2.4 are vulnerable when processing MP4 files with the affected function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if exploited successfully.

🟠

Likely Case

Application crash (denial of service) when processing malicious MP4 files.

🟢

If Mitigated

Limited impact if proper input validation and sandboxing are implemented.

🌐 Internet-Facing: MEDIUM - Requires processing untrusted MP4 files, which could occur in web services handling media uploads.
🏢 Internal Only: LOW - Typically requires user interaction to open malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious MP4 file and convincing a user to process it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: gpac 2.5 or later

Vendor Advisory: https://github.com/gpac/gpac/issues/2988

Restart Required: No

Instructions:

1. Update gpac to version 2.5 or later. 2. Recompile from source if using custom builds. 3. Verify the fix by checking the version.

🔧 Temporary Workarounds

Input validation

all

Implement strict input validation for MP4 files before processing with gpac.

🧯 If You Can't Patch

  • Restrict gpac/MP4Box usage to trusted users only.
  • Implement sandboxing or containerization for media processing workflows.

🔍 How to Verify

Check if Vulnerable:

Check gpac version with 'gpac -version' or 'MP4Box -version' and verify if it's 2.4.

Check Version:

gpac -version

Verify Fix Applied:

Update to gpac 2.5+ and confirm version with 'gpac -version'.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of gpac/MP4Box
  • Segmentation fault errors in system logs

Network Indicators:

  • Unusual MP4 file uploads to media processing services

SIEM Query:

source="*gpac*" OR source="*MP4Box*" AND ("segmentation fault" OR "heap overflow" OR "crash")

🔗 References

📤 Share & Export