gstreamer-plugins-base is vulnerable to arbitrary code execution. An integer overflow flaw which caused a heap-based buffer overflow was discovered in the Vorbis comment tags reader. An attacker could create a carefully-crafted Vorbis file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if opened by a victim.
cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9
lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff
openwall.com/lists/oss-security/2009/03/12/2
secunia.com/advisories/34335
secunia.com/advisories/34350
secunia.com/advisories/35777
security.gentoo.org/glsa/glsa-200907-11.xml
www.mandriva.com/security/advisories?name=MDVSA-2009:085
www.ocert.org/advisories/ocert-2008-015.html
www.redhat.com/security/updates/classification/#moderate
www.securityfocus.com/archive/1/501712/100/0/threaded
www.securityfocus.com/bid/34100
www.ubuntu.com/usn/USN-735-1
access.redhat.com/errata/RHSA-2009:0352
access.redhat.com/security/cve/CVE-2009-0586
bugzilla.redhat.com/show_bug.cgi?id=488208
exchange.xforce.ibmcloud.com/vulnerabilities/49274
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9694