Description
Buffer Overflow vulnerability in GPAC before commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 allows an attacker to cause a denial of service via the src/scenegraph/svg_attributes.c, svg_parse_strings(), gf_svg_parse_attribute()
Published: 2026-05-05
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow occurs in GPAC when parsing SVG attributes, specifically within src/scenegraph/svg_attributes.c and the svg_parse_strings() function that calls gf_svg_parse_attribute(). The overflow can be triggered by malformed input, allowing an attacker to cause the program to crash and interrupt service availability. The impact is limited to denial of service without direct compromise of confidentiality or integrity, but repeated crashes could allow an attacker to disrupt operations and force manual intervention or automated reboot cycles.

Affected Systems

Any GPAC installation using a version before commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 is vulnerable. No specific vendor or product catalog is listed; the issue applies to the GPAC media framework itself. No explicit version range is provided beyond the reference commit, so all releases prior to that commit are considered at risk.

Risk and Exploitability

The CVSS score is not supplied, and the EPSS score is unavailable, so the precise severity cannot be quantified through these metrics. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed exploitation in the wild as of this report. The attack vector is inferred to be remote if the GPAC engine processes untrusted SVG content received over a network, or local if the attacker can supply crafted SVG files to the system. Exploitation requires the ability to feed malformed SVG into the parser, and thus may be mitigated by controlling input sources.

Generated by OpenCVE AI on May 5, 2026 at 17:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update GPAC to commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 or later
  • If an update is unavailable, restrict or disable SVG parsing for untrusted sources until a patch is applied
  • Monitor system logs for repeated crashes or denial-of-service patterns that could indicate exploitation

Generated by OpenCVE AI on May 5, 2026 at 17:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Gpac
Gpac gpac
Vendors & Products Gpac
Gpac gpac

Tue, 05 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Denial-of-Service via Buffer Overflow in GPAC SVG Parsing
Weaknesses CWE-119

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description Buffer Overflow vulnerability in GPAC before commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 allows an attacker to cause a denial of service via the src/scenegraph/svg_attributes.c, svg_parse_strings(), gf_svg_parse_attribute()
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-05T14:49:47.659Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39103

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T16:16:12.993

Modified: 2026-05-05T16:16:12.993

Link: CVE-2026-39103

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T18:00:12Z

Weaknesses