CVE-2025-70303

5.5 MEDIUM

📋 TL;DR

A heap overflow vulnerability in GPAC's uncv_parse_config() function allows attackers to cause Denial of Service (DoS) by providing a specially crafted MP4 file. This affects GPAC v2.4.0 users who process untrusted media files, potentially crashing applications that use this library.

💻 Affected Systems

Products:
  • GPAC (Multimedia Framework)
Versions: v2.4.0
Operating Systems: All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using GPAC to parse MP4 files is vulnerable when processing untrusted content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to service disruption, potentially affecting media processing pipelines or streaming services.

🟠

Likely Case

Application crash when processing malicious MP4 files, causing temporary DoS until service restart.

🟢

If Mitigated

Limited impact if file uploads are restricted or sandboxed environments are used.

🌐 Internet-Facing: MEDIUM - Exploitable via file uploads to web services using GPAC, but requires specific MP4 processing.
🏢 Internal Only: LOW - Requires users to process malicious files, less likely in controlled environments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub demonstrates DoS via crafted MP4 file. No authentication required to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor GPAC repository for updates. Consider upgrading to newer versions if vulnerability is fixed.

🔧 Temporary Workarounds

Input Validation and Sandboxing

all

Implement strict validation of MP4 files before processing and run GPAC in sandboxed/isolated environments.

File Upload Restrictions

all

Restrict or scan MP4 file uploads to services using GPAC.

🧯 If You Can't Patch

  • Implement network segmentation to isolate GPAC services from critical systems
  • Deploy application monitoring to detect crash patterns and anomalous MP4 processing

🔍 How to Verify

Check if Vulnerable:

Check if GPAC version is 2.4.0 using 'gpac -version' or by examining installed packages.

Check Version:

gpac -version

Verify Fix Applied:

Verify GPAC version is updated beyond 2.4.0 when patch becomes available.

📡 Detection & Monitoring

Log Indicators:

  • GPAC process crashes
  • Segmentation fault errors in application logs
  • Abnormal termination of media processing services

Network Indicators:

  • Unusual MP4 file uploads to services
  • Repeated connection attempts to media processing endpoints

SIEM Query:

source="application.log" AND ("segmentation fault" OR "gpac crash" OR "heap overflow")

🔗 References

📤 Share & Export