CVE-2025-70305
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-15

Assigner: MITRE

Description
A stack overflow in the dmx_saf function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .saf file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-15
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gpac gpac 2.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack overflow in the dmx_saf function of GPAC version 2.4.0. It occurs when processing a specially crafted .saf file, which can cause the program to crash or behave unexpectedly.


How can this vulnerability impact me? :

Exploiting this vulnerability can cause a Denial of Service (DoS) by crashing the GPAC application when it processes a malicious .saf file. This means the service or application using GPAC could become unavailable or unstable.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by identifying attempts to process crafted .saf files that trigger the stack overflow in the dmx_saf function of GPAC v2.4.0. Since the vulnerability is triggered by specially crafted .saf files, monitoring for unusual or unexpected .saf file processing or scanning files for known malicious patterns is recommended. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use or processing of untrusted or suspicious .saf files with GPAC v2.4.0, restricting access to systems running vulnerable GPAC versions, and applying any available patches or updates once released. Since the vulnerability causes a denial of service via crafted .saf files, preventing such files from being processed is critical. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart