CVE-2025-7797

5.3 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in GPAC's DASH client allows remote attackers to cause denial of service by manipulating the base_init_url argument. This affects GPAC multimedia framework users who process DASH streams. The vulnerability can be triggered remotely without authentication.

💻 Affected Systems

Products:
  • GPAC Multimedia Framework
Versions: All versions up to 2.4
Operating Systems: All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing DASH streams with manipulated base_init_url

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for media processing functionality

🟠

Likely Case

Service disruption when processing malicious DASH streams, potentially affecting media playback or streaming services

🟢

If Mitigated

Minimal impact with proper input validation and error handling in place

🌐 Internet-Facing: MEDIUM - Remote exploitation possible but limited to denial of service
🏢 Internal Only: LOW - Requires processing of malicious DASH streams

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code has been publicly disclosed and requires sending specially crafted DASH stream

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 153ea314b6b053db17164f8bc3c7e1e460938eaa

Vendor Advisory: https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa

Restart Required: Yes

Instructions:

1. Update GPAC to version after 2.4 or apply commit 153ea314b6b053db17164f8bc3c7e1e460938eaa
2. Recompile GPAC from source if using custom build
3. Restart any services using GPAC

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation for DASH stream URLs before processing

# Implement custom validation in application code before calling gf_dash_download_init_segment

Process Isolation

linux

Run GPAC in isolated container or sandbox to limit crash impact

docker run --security-opt=no-new-privileges -it gpac-container

🧯 If You Can't Patch

  • Implement network filtering to block suspicious DASH stream sources
  • Deploy monitoring to detect and alert on GPAC process crashes

🔍 How to Verify

Check if Vulnerable:

Check GPAC version with 'gpac -version' and verify if version is 2.4 or earlier

Check Version:

gpac -version 2>&1 | head -1

Verify Fix Applied:

Verify commit hash includes 153ea314b6b053db17164f8bc3c7e1e460938eaa or version is newer than 2.4

📡 Detection & Monitoring

Log Indicators:

  • GPAC process crashes
  • Segmentation fault errors in system logs
  • Abnormal termination of media processing services

Network Indicators:

  • Unusual DASH stream requests with malformed URLs
  • Repeated connection attempts to media processing endpoints

SIEM Query:

process_name:"gpac" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export