VYPR
Medium severity5.8NVD Advisory· Published Mar 20, 2026· Updated Apr 14, 2026

CVE-2026-33144

CVE-2026-33144

Description

GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gf_xml_parse_bit_sequence_bs function in utils/xml_bin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements. An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36.

Affected products

1
  • cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*
    Range: <2026-03-17

Patches

1
86b0e36ea4c7

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.