Gpac v2.2.1 vulnerable to Use-After-Free (UAF) via dasher_configure_pid function
CVE-2024-24266
7.5HIGH
What is CVE-2024-24266?
The GPAC software version 2.2.1 has been identified to contain a Use-After-Free (UAF) vulnerability particularly triggered through the function dasher_configure_pid located at /src/filters/dasher.c. This flaw can potentially allow attackers to execute arbitrary code or disrupt service, making it essential for users to apply necessary patches and updates to secure their systems against exploitation.