CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.6%
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
Vendor | Product | Version | CPE |
---|---|---|---|
gstreamer | good_plug-ins | 0.10.9 | cpe:2.3:a:gstreamer:good_plug-ins:0.10.9:*:*:*:*:*:*:* |
gstreamer | good_plug-ins | 0.10.10 | cpe:2.3:a:gstreamer:good_plug-ins:0.10.10:*:*:*:*:*:*:* |
gstreamer | good_plug-ins | 0.10.11 | cpe:2.3:a:gstreamer:good_plug-ins:0.10.11:*:*:*:*:*:*:* |
cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53
gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html
lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
secunia.com/advisories/33650
secunia.com/advisories/33815
secunia.com/advisories/34336
secunia.com/advisories/35777
security.gentoo.org/glsa/glsa-200907-11.xml
trapkit.de/advisories/TKADV2009-003.txt
www.mandriva.com/security/advisories?name=MDVSA-2009:035
www.openwall.com/lists/oss-security/2009/01/29/3
www.redhat.com/support/errata/RHSA-2009-0271.html
www.securityfocus.com/archive/1/500317/100/0/threaded
www.securityfocus.com/bid/33405
www.ubuntu.com/usn/USN-736-1
www.vupen.com/english/advisories/2009/0225
bugzilla.redhat.com/show_bug.cgi?id=481267
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10306