CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
87.0%
Severity: Low
Date : 2017-02-03
CVE-ID : CVE-2016-10198 CVE-2016-10199 CVE-2017-5840 CVE-2017-5841
CVE-2017-5845
Package : gst-plugins-good
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-163
The package gst-plugins-good before version 1.10.3-1 is vulnerable to
denial of service.
Upgrade to 1.10.3-1.
The problems have been fixed upstream in version 1.10.3.
None.
An invalid memory read flaw has been found in gstreamer before 1.10.3,
in gst_aac_parse_sink_setcaps.
An out of bounds read has been found in gstreamer before 1.10.3, in
qtdemux_tag_add_str_full.
An out-of-bounds read has been found in gstreamer before 1.10.3, in
qtdemux_parse_samples.
An out-of-bounds read has been found in gstreamer before 1.10.3, in
gst_avi_demux_parse_ncdt.
An out-of-bounds read has been found in gstreamer before 1.10.3, in
gst_avi_demux_parse_ncdt.
A remote attacker can crash gstreamer via a crafted file.
http://seclists.org/oss-sec/2017/q1/284
https://bugzilla.gnome.org/show_bug.cgi?id=775450
https://bugzilla.gnome.org/show_bug.cgi?id=775451
https://bugzilla.gnome.org/show_bug.cgi?id=777469
https://bugzilla.gnome.org/show_bug.cgi?id=777500
https://bugzilla.gnome.org/show_bug.cgi?id=777532
https://security.archlinux.org/CVE-2016-10198
https://security.archlinux.org/CVE-2016-10199
https://security.archlinux.org/CVE-2017-5840
https://security.archlinux.org/CVE-2017-5841
https://security.archlinux.org/CVE-2017-5845
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | gst-plugins-good | < 1.10.3-1 | UNKNOWN |
seclists.org/oss-sec/2017/q1/284
bugzilla.gnome.org/show_bug.cgi?id=775450
bugzilla.gnome.org/show_bug.cgi?id=775451
bugzilla.gnome.org/show_bug.cgi?id=777469
bugzilla.gnome.org/show_bug.cgi?id=777500
bugzilla.gnome.org/show_bug.cgi?id=777532
security.archlinux.org/AVG-163
security.archlinux.org/CVE-2016-10198
security.archlinux.org/CVE-2016-10199
security.archlinux.org/CVE-2017-5840
security.archlinux.org/CVE-2017-5841
security.archlinux.org/CVE-2017-5845
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
87.0%