CVE-2025-70304
📋 TL;DR
A buffer overflow vulnerability in GPAC's vobsub_get_subpic_duration() function allows attackers to cause denial of service by sending specially crafted packets. This affects systems running GPAC v2.4.0 that process VobSub subtitle files. Attackers can crash the application but not execute arbitrary code.
💻 Affected Systems
- GPAC (Multimedia Framework)
📦 What is this software?
Gpac by Gpac
⚠️ Risk & Real-World Impact
Worst Case
Complete application crash leading to denial of service for all GPAC-dependent services, potentially disrupting media processing workflows.
Likely Case
Application crash when processing malicious VobSub subtitle files, causing temporary service disruption until restart.
If Mitigated
Application crash contained within isolated process, minimal impact with proper monitoring and restart mechanisms.
🎯 Exploit Status
Proof of concept available on GitHub demonstrates reliable DoS. Exploit requires delivering malicious subtitle file to vulnerable system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.4.1 or later
Vendor Advisory: https://github.com/gpac/gpac/security/advisories
Restart Required: Yes
Instructions:
1. Download latest GPAC release from official repository. 2. Compile and install following build instructions. 3. Restart all GPAC-dependent services.
🔧 Temporary Workarounds
Disable VobSub Processing
allConfigure GPAC to skip or disable VobSub subtitle processing
gpac -no-vobsub
Input Validation Filter
allImplement file validation to reject suspicious VobSub files before processing
🧯 If You Can't Patch
- Isolate GPAC processing to dedicated containers/VMs with resource limits
- Implement strict file upload controls and scan all subtitle files before processing
🔍 How to Verify
Check if Vulnerable:
Check GPAC version: gpac -version. If output shows 2.4.0, system is vulnerable.
Check Version:
gpac -version 2>&1 | head -1
Verify Fix Applied:
After update, verify version shows 2.4.1 or later and test with known malicious VobSub file.
📡 Detection & Monitoring
Log Indicators:
- GPAC segmentation fault logs
- Application crash reports with vobsub_get_subpic_duration in stack trace
- Abnormal process termination
Network Indicators:
- Unusual VobSub file transfers to media servers
- Multiple failed subtitle processing attempts
SIEM Query:
process_name:"gpac" AND (event_type:"crash" OR exit_code:139) AND stack_trace:"vobsub_get_subpic_duration"