Lucene search

K
freebsdFreeBSD37A365ED-1269-11DE-A964-0030843D3802
HistoryJan 22, 2009 - 12:00 a.m.

gstreamer-plugins-good -- multiple memory overflows

2009-01-2200:00:00
vuxml.freebsd.org
16

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.437

Percentile

97.4%

Secunia reports:

Tobias Klein has reported some vulnerabilities in GStreamer Good
Plug-ins, which can potentially be exploited by malicious people to
compromise a vulnerable system.
A boundary error occurs within the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “ctts”
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.
An array indexing error exists in the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “stss”
Atom parsing. This can be exploited to corrupt memory via a specially
crafted QuickTime media file.
A boundary error occurs within the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “stts”
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgstreamer-plugins-good= 0.10.9,3UNKNOWN
FreeBSDanynoarchgstreamer-plugins-good< 0.10.12,3UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.437

Percentile

97.4%