Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53
gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html
lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
secunia.com/advisories/33650
secunia.com/advisories/33815
secunia.com/advisories/34336
secunia.com/advisories/35777
security.gentoo.org/glsa/glsa-200907-11.xml
trapkit.de/advisories/TKADV2009-003.txt
www.mandriva.com/security/advisories?name=MDVSA-2009:035
www.openwall.com/lists/oss-security/2009/01/29/3
www.redhat.com/support/errata/RHSA-2009-0271.html
www.securityfocus.com/archive/1/500317/100/0/threaded
www.securityfocus.com/bid/33405
www.ubuntu.com/usn/USN-736-1
www.vupen.com/english/advisories/2009/0225
bugzilla.redhat.com/show_bug.cgi?id=481267
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10306