ID CVE-2009-0386 Type cve Reporter NVD Modified 2018-10-11T17:01:34
Description
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
{"openvas": [{"lastseen": "2018-04-06T11:40:07", "bulletinFamily": "scanner", "description": "The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1213.", "modified": "2018-04-06T00:00:00", "published": "2009-03-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063455", "id": "OPENVAS:136141256231063455", "title": "Fedora Core 10 FEDORA-2009-1213 (gstreamer-plugins-good)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_1213.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-1213 (gstreamer-plugins-good)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"ChangeLog:\n\n* Mon Jan 26 2009 - Bastien Nocera - 0.10.13-1\n- Update to 0.10.13\n- Update libv4l patch\n* Wed Jan 14 2009 Warren Togami 0.10.11-4\n- Bug #477877 Fix multilib conflict in -devel\n- Bug #478449 Fix ladspa on lib64\n* Wed Jan 14 2009 Lennart Poettering 0.10.11-3\n- Bug #470000 Fix thread/memleak due to ref-loop\n* Tue Jan 13 2009 Bastien Nocera - 0.10.11-2\n- Avoid pulsesink hang when PulseAudio disappears\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update gstreamer-plugins-good' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1213\";\ntag_summary = \"The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1213.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63455\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-1213 (gstreamer-plugins-good)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=481267\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483736\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483737\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.13~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~devel~0.10.13\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~debuginfo~0.10.13\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:57:02", "bulletinFamily": "scanner", "description": "The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1213.", "modified": "2017-07-10T00:00:00", "published": "2009-03-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63455", "id": "OPENVAS:63455", "title": "Fedora Core 10 FEDORA-2009-1213 (gstreamer-plugins-good)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_1213.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-1213 (gstreamer-plugins-good)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"ChangeLog:\n\n* Mon Jan 26 2009 - Bastien Nocera - 0.10.13-1\n- Update to 0.10.13\n- Update libv4l patch\n* Wed Jan 14 2009 Warren Togami 0.10.11-4\n- Bug #477877 Fix multilib conflict in -devel\n- Bug #478449 Fix ladspa on lib64\n* Wed Jan 14 2009 Lennart Poettering 0.10.11-3\n- Bug #470000 Fix thread/memleak due to ref-loop\n* Tue Jan 13 2009 Bastien Nocera - 0.10.11-2\n- Avoid pulsesink hang when PulseAudio disappears\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update gstreamer-plugins-good' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1213\";\ntag_summary = \"The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1213.\";\n\n\n\nif(description)\n{\n script_id(63455);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-1213 (gstreamer-plugins-good)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=481267\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483736\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483737\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.13~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~devel~0.10.13\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~debuginfo~0.10.13\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:18", "bulletinFamily": "scanner", "description": "The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1343.", "modified": "2017-07-10T00:00:00", "published": "2009-03-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63453", "id": "OPENVAS:63453", "title": "Fedora Core 9 FEDORA-2009-1343 (gstreamer-plugins-good)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_1343.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-1343 (gstreamer-plugins-good)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"ChangeLog:\n\n* Mon Feb 2 2009 - Bastien Nocera - 0.10.8-10\n- Patch for overflows in the QT demuxer (#481267)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update gstreamer-plugins-good' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1343\";\ntag_summary = \"The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1343.\";\n\n\n\nif(description)\n{\n script_id(63453);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 9 FEDORA-2009-1343 (gstreamer-plugins-good)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=481267\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483736\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483737\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.8~10.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~devel~0.10.8\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~debuginfo~0.10.8\", rls:\"FC9\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:00", "bulletinFamily": "scanner", "description": "The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1343.", "modified": "2018-04-06T00:00:00", "published": "2009-03-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063453", "id": "OPENVAS:136141256231063453", "type": "openvas", "title": "Fedora Core 9 FEDORA-2009-1343 (gstreamer-plugins-good)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_1343.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-1343 (gstreamer-plugins-good)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"ChangeLog:\n\n* Mon Feb 2 2009 - Bastien Nocera - 0.10.8-10\n- Patch for overflows in the QT demuxer (#481267)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update gstreamer-plugins-good' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1343\";\ntag_summary = \"The remote host is missing an update to gstreamer-plugins-good\nannounced via advisory FEDORA-2009-1343.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63453\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 9 FEDORA-2009-1343 (gstreamer-plugins-good)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=481267\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483736\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=483737\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.8~10.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~devel~0.10.8\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~debuginfo~0.10.8\", rls:\"FC9\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:19", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2018-04-06T00:00:00", "published": "2009-03-20T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063626", "id": "OPENVAS:136141256231063626", "title": "FreeBSD Ports: gstreamer-plugins-good", "type": "openvas", "sourceData": "#\n#VID 37a365ed-1269-11de-a964-0030843d3802\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 37a365ed-1269-11de-a964-0030843d3802\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: gstreamer-plugins-good\n\nCVE-2009-0386\nHeap-based buffer overflow in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers\nto execute arbitrary code via crafted Composition Time To Sample\n(ctts) atom data in a malformed QuickTime media .mov file.\n\nCVE-2009-0387\nArray index error in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to\ncause a denial of service (application crash) and possibly execute\narbitrary code via crafted Sync Sample (aka stss) atom data in a\nmalformed QuickTime media .mov file, related to 'mark keyframes.'\n\nCVE-2009-0397\nHeap-based buffer overflow in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka\ngstreamer-plugins) 0.8.5, might allow remote attackers to execute\narbitrary code via crafted Time-to-sample (aka stts) atom data in a\nmalformed QuickTime media .mov file.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://secunia.com/advisories/33650/\nhttp://trapkit.de/advisories/TKADV2009-003.txt\nhttp://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html\nhttp://www.vuxml.org/freebsd/37a365ed-1269-11de-a964-0030843d3802.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63626\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"FreeBSD Ports: gstreamer-plugins-good\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"gstreamer-plugins-good\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0.10.9,3\")>=0 && revcomp(a:bver, b:\"0.10.12,3\")<0) {\n txt += 'Package gstreamer-plugins-good version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-09-28T18:24:38", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2009-0271", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122520", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122520", "title": "Oracle Linux Local Check: ELSA-2009-0271", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2009-0271.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122520\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:47:12 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2009-0271\");\n script_tag(name:\"insight\", value:\"ELSA-2009-0271 - gstreamer-plugins-good security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2009-0271\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2009-0271.html\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.9~1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"gstreamer-plugins-good-devel\", rpm:\"gstreamer-plugins-good-devel~0.10.9~1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:13:47", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-12-23T00:00:00", "published": "2009-03-20T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63626", "id": "OPENVAS:63626", "title": "FreeBSD Ports: gstreamer-plugins-good", "type": "openvas", "sourceData": "#\n#VID 37a365ed-1269-11de-a964-0030843d3802\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 37a365ed-1269-11de-a964-0030843d3802\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: gstreamer-plugins-good\n\nCVE-2009-0386\nHeap-based buffer overflow in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers\nto execute arbitrary code via crafted Composition Time To Sample\n(ctts) atom data in a malformed QuickTime media .mov file.\n\nCVE-2009-0387\nArray index error in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to\ncause a denial of service (application crash) and possibly execute\narbitrary code via crafted Sync Sample (aka stss) atom data in a\nmalformed QuickTime media .mov file, related to 'mark keyframes.'\n\nCVE-2009-0397\nHeap-based buffer overflow in the qtdemux_parse_samples function in\ngst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka\ngst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka\ngstreamer-plugins) 0.8.5, might allow remote attackers to execute\narbitrary code via crafted Time-to-sample (aka stts) atom data in a\nmalformed QuickTime media .mov file.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://secunia.com/advisories/33650/\nhttp://trapkit.de/advisories/TKADV2009-003.txt\nhttp://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html\nhttp://www.vuxml.org/freebsd/37a365ed-1269-11de-a964-0030843d3802.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(63626);\n script_version(\"$Revision: 4847 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-23 10:33:16 +0100 (Fri, 23 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"FreeBSD Ports: gstreamer-plugins-good\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"gstreamer-plugins-good\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0.10.9,3\")>=0 && revcomp(a:bver, b:\"0.10.12,3\")<0) {\n txt += 'Package gstreamer-plugins-good version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:16", "bulletinFamily": "scanner", "description": "The remote host is missing an update to gstreamer0.10-plugins-good\nannounced via advisory MDVSA-2009:035.", "modified": "2018-04-06T00:00:00", "published": "2009-02-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063372", "id": "OPENVAS:136141256231063372", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:035 (gstreamer0.10-plugins-good)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_035.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:035 (gstreamer0.10-plugins-good)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Security vulnerabilities have been discovered and corrected in\ngstreamer0.10-plugins-good, might allow remote attackers to execute\narbitrary code via a malformed QuickTime media file (CVE-2009-0386,\nCVE-2009-0387, CVE-2009-0397).\n\nThe updated packages have been patched to prevent this.\n\nAffected: 2008.0, 2008.1, 2009.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:035\";\ntag_summary = \"The remote host is missing an update to gstreamer0.10-plugins-good\nannounced via advisory MDVSA-2009:035.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63372\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:035 (gstreamer0.10-plugins-good)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-aalib\", rpm:\"gstreamer0.10-aalib~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-caca\", rpm:\"gstreamer0.10-caca~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-dv\", rpm:\"gstreamer0.10-dv~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-esound\", rpm:\"gstreamer0.10-esound~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-flac\", rpm:\"gstreamer0.10-flac~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-plugins-good\", rpm:\"gstreamer0.10-plugins-good~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-raw1394\", rpm:\"gstreamer0.10-raw1394~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-speex\", rpm:\"gstreamer0.10-speex~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-wavpack\", rpm:\"gstreamer0.10-wavpack~0.10.6~3.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-aalib\", rpm:\"gstreamer0.10-aalib~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-caca\", rpm:\"gstreamer0.10-caca~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-dv\", rpm:\"gstreamer0.10-dv~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-esound\", rpm:\"gstreamer0.10-esound~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-flac\", rpm:\"gstreamer0.10-flac~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-plugins-good\", rpm:\"gstreamer0.10-plugins-good~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-raw1394\", rpm:\"gstreamer0.10-raw1394~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-speex\", rpm:\"gstreamer0.10-speex~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-wavpack\", rpm:\"gstreamer0.10-wavpack~0.10.7~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-aalib\", rpm:\"gstreamer0.10-aalib~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-caca\", rpm:\"gstreamer0.10-caca~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-dv\", rpm:\"gstreamer0.10-dv~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-esound\", rpm:\"gstreamer0.10-esound~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-flac\", rpm:\"gstreamer0.10-flac~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-plugins-good\", rpm:\"gstreamer0.10-plugins-good~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-pulse\", rpm:\"gstreamer0.10-pulse~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-raw1394\", rpm:\"gstreamer0.10-raw1394~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-soup\", rpm:\"gstreamer0.10-soup~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-speex\", rpm:\"gstreamer0.10-speex~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer0.10-wavpack\", rpm:\"gstreamer0.10-wavpack~0.10.10~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:56:51", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0271.\n\nGStreamer is a streaming media framework, based on graphs of filters which\noperate on media data. GStreamer Good Plug-ins is a collection of\nwell-supported, GStreamer plug-ins of good quality released under the LGPL\nlicense.\n\nMultiple heap buffer overflows and an array indexing error were found in\nthe GStreamer's QuickTime media file format decoding plugin. An attacker\ncould create a carefully-crafted QuickTime media .mov file that would cause\nan application using GStreamer to crash or, potentially, execute arbitrary\ncode if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling the update, all applications using GStreamer (such as totem or\nrhythmbox) must be restarted for the changes to take effect.", "modified": "2017-07-12T00:00:00", "published": "2009-02-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63321", "id": "OPENVAS:63321", "title": "RedHat Security Advisory RHSA-2009:0271", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0271.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0271 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0271.\n\nGStreamer is a streaming media framework, based on graphs of filters which\noperate on media data. GStreamer Good Plug-ins is a collection of\nwell-supported, GStreamer plug-ins of good quality released under the LGPL\nlicense.\n\nMultiple heap buffer overflows and an array indexing error were found in\nthe GStreamer's QuickTime media file format decoding plugin. An attacker\ncould create a carefully-crafted QuickTime media .mov file that would cause\nan application using GStreamer to crash or, potentially, execute arbitrary\ncode if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling the update, all applications using GStreamer (such as totem or\nrhythmbox) must be restarted for the changes to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(63321);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:0271\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0271.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good-debuginfo\", rpm:\"gstreamer-plugins-good-debuginfo~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good-devel\", rpm:\"gstreamer-plugins-good-devel~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:42", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0271.\n\nGStreamer is a streaming media framework, based on graphs of filters which\noperate on media data. GStreamer Good Plug-ins is a collection of\nwell-supported, GStreamer plug-ins of good quality released under the LGPL\nlicense.\n\nMultiple heap buffer overflows and an array indexing error were found in\nthe GStreamer's QuickTime media file format decoding plugin. An attacker\ncould create a carefully-crafted QuickTime media .mov file that would cause\nan application using GStreamer to crash or, potentially, execute arbitrary\ncode if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling the update, all applications using GStreamer (such as totem or\nrhythmbox) must be restarted for the changes to take effect.", "modified": "2018-04-06T00:00:00", "published": "2009-02-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063321", "id": "OPENVAS:136141256231063321", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:0271", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0271.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0271 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0271.\n\nGStreamer is a streaming media framework, based on graphs of filters which\noperate on media data. GStreamer Good Plug-ins is a collection of\nwell-supported, GStreamer plug-ins of good quality released under the LGPL\nlicense.\n\nMultiple heap buffer overflows and an array indexing error were found in\nthe GStreamer's QuickTime media file format decoding plugin. An attacker\ncould create a carefully-crafted QuickTime media .mov file that would cause\nan application using GStreamer to crash or, potentially, execute arbitrary\ncode if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling the update, all applications using GStreamer (such as totem or\nrhythmbox) must be restarted for the changes to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63321\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)\");\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:0271\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0271.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good\", rpm:\"gstreamer-plugins-good~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good-debuginfo\", rpm:\"gstreamer-plugins-good-debuginfo~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gstreamer-plugins-good-devel\", rpm:\"gstreamer-plugins-good-devel~0.10.9~1.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-02-21T01:11:42", "bulletinFamily": "scanner", "description": "- Mon Jan 26 2009 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.13-1\n\n - Update to 0.10.13\n\n - Update libv4l patch\n\n - Wed Jan 14 2009 Warren Togami <wtogami at redhat.com> 0.10.11-4\n\n - Bug #477877 Fix multilib conflict in -devel\n\n - Bug #478449 Fix ladspa on lib64\n\n - Wed Jan 14 2009 Lennart Poettering <lpoetter at redhat.com> 0.10.11-3\n\n - Bug #470000 Fix thread/memleak due to ref-loop\n\n - Tue Jan 13 2009 Bastien Nocera <bnocera at redhat.com>\n - 0.10.11-2\n\n - Avoid pulsesink hang when PulseAudio disappears\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2015-10-21T00:00:00", "id": "FEDORA_2009-1213.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=36882", "published": "2009-04-23T00:00:00", "title": "Fedora 10 : gstreamer-plugins-good-0.10.13-1.fc10 (2009-1213)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-1213.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(36882);\n script_version (\"$Revision: 1.11 $\");\n script_cvs_date(\"$Date: 2015/10/21 22:32:49 $\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_xref(name:\"FEDORA\", value:\"2009-1213\");\n\n script_name(english:\"Fedora 10 : gstreamer-plugins-good-0.10.13-1.fc10 (2009-1213)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Mon Jan 26 2009 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.13-1\n\n - Update to 0.10.13\n\n - Update libv4l patch\n\n - Wed Jan 14 2009 Warren Togami <wtogami at redhat.com>\n 0.10.11-4\n\n - Bug #477877 Fix multilib conflict in -devel\n\n - Bug #478449 Fix ladspa on lib64\n\n - Wed Jan 14 2009 Lennart Poettering <lpoetter at\n redhat.com> 0.10.11-3\n\n - Bug #470000 Fix thread/memleak due to ref-loop\n\n - Tue Jan 13 2009 Bastien Nocera <bnocera at redhat.com>\n - 0.10.11-2\n\n - Avoid pulsesink hang when PulseAudio disappears\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=481267\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=483736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=483737\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-February/020650.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5d2b6c0d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gstreamer-plugins-good package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gstreamer-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"gstreamer-plugins-good-0.10.13-1.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-plugins-good\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:11:30", "bulletinFamily": "scanner", "description": "- Mon Feb 2 2009 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.8-10\n\n - Patch for overflows in the QT demuxer (#481267)\n\n - Tue Aug 12 2008 Adam Jackson <ajax at redhat.com> 0.10.8-9\n\n - gst-plugins-good-0.10.8-http-auth.patch: Fix http auth. (#457952)\n\n - Mon Jul 21 2008 Adam Jackson <ajax at redhat.com> 0.10.8-8\n\n - gst-plugins-good-0.10.8-v4l2-progressive-fix.patch:\n Backport v4l2 interlace/progressive fixes. (#454534)\n\n - Thu Jun 19 2008 Adam Jackson <ajax at redhat.com> 0.10.8-7\n\n - gst-plugins-good-0.10.8-speex-nego.patch: Backport speex channel and rate negotiation from 0.10.9.\n (#451391)\n\n - Tue Jun 17 2008 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.8-6\n\n - Really fix the default audio output not being correct\n\n - Tue Jun 3 2008 - Bastien Nocera <bnocera at redhat.com> - 0.10.8-5\n\n - Fix compilation of the v4l2 plugin with newer kernels\n\n - Mon Jun 2 2008 - Bastien Nocera <bnocera at redhat.com> - 0.10.8-4\n\n - Work-around bug that would set the default audio output to 'GOOM!' See http://bugzilla.gnome.org/show_bug.cgi?id=532295\n\n - Wed May 21 2008 Tom 'spot' Callaway <tcallawa at redhat.com> 0.10.8-3\n\n - fix license tag\n\n - Wed May 21 2008 Adam Jackson <ajax at redhat.com> 0.10.8-2\n\n - BR: libsoup-devel and package the soup http src plugin. (#447604)\n\n - s/Fedora Core/Fedora/\n\n - Thu Apr 24 2008 - Bastien Nocera <bnocera at redhat.com> - 0.10.8-1\n\n - Update to 0.10.8\n\n - Thu Apr 10 2008 - Bastien Nocera <bnocera at redhat.com> - 0.10.7-2\n\n - Add patch to unbreak the QuickTime demuxer plugin\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-20T00:00:00", "id": "FEDORA_2009-1343.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=35734", "published": "2009-02-25T00:00:00", "title": "Fedora 9 : gstreamer-plugins-good-0.10.8-10.fc9 (2009-1343)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-1343.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(35734);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2018/11/20 11:04:16\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\");\n script_bugtraq_id(33405);\n script_xref(name:\"FEDORA\", value:\"2009-1343\");\n\n script_name(english:\"Fedora 9 : gstreamer-plugins-good-0.10.8-10.fc9 (2009-1343)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Mon Feb 2 2009 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.8-10\n\n - Patch for overflows in the QT demuxer (#481267)\n\n - Tue Aug 12 2008 Adam Jackson <ajax at redhat.com>\n 0.10.8-9\n\n - gst-plugins-good-0.10.8-http-auth.patch: Fix http\n auth. (#457952)\n\n - Mon Jul 21 2008 Adam Jackson <ajax at redhat.com>\n 0.10.8-8\n\n - gst-plugins-good-0.10.8-v4l2-progressive-fix.patch:\n Backport v4l2 interlace/progressive fixes. (#454534)\n\n - Thu Jun 19 2008 Adam Jackson <ajax at redhat.com>\n 0.10.8-7\n\n - gst-plugins-good-0.10.8-speex-nego.patch: Backport\n speex channel and rate negotiation from 0.10.9.\n (#451391)\n\n - Tue Jun 17 2008 - Bastien Nocera <bnocera at redhat.com>\n - 0.10.8-6\n\n - Really fix the default audio output not being correct\n\n - Tue Jun 3 2008 - Bastien Nocera <bnocera at\n redhat.com> - 0.10.8-5\n\n - Fix compilation of the v4l2 plugin with newer kernels\n\n - Mon Jun 2 2008 - Bastien Nocera <bnocera at\n redhat.com> - 0.10.8-4\n\n - Work-around bug that would set the default audio\n output to 'GOOM!' See\n http://bugzilla.gnome.org/show_bug.cgi?id=532295\n\n - Wed May 21 2008 Tom 'spot' Callaway <tcallawa at\n redhat.com> 0.10.8-3\n\n - fix license tag\n\n - Wed May 21 2008 Adam Jackson <ajax at redhat.com>\n 0.10.8-2\n\n - BR: libsoup-devel and package the soup http src\n plugin. (#447604)\n\n - s/Fedora Core/Fedora/\n\n - Thu Apr 24 2008 - Bastien Nocera <bnocera at\n redhat.com> - 0.10.8-1\n\n - Update to 0.10.8\n\n - Thu Apr 10 2008 - Bastien Nocera <bnocera at\n redhat.com> - 0.10.7-2\n\n - Add patch to unbreak the QuickTime demuxer plugin\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://bugzilla.gnome.org/show_bug.cgi?id=532295\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.gnome.org/show_bug.cgi?id=532295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=481267\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=483736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=483737\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-February/020564.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e39f52cc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gstreamer-plugins-good package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gstreamer-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:9\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/02/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^9([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 9.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC9\", reference:\"gstreamer-plugins-good-0.10.8-10.fc9\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-plugins-good\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:17:08", "bulletinFamily": "scanner", "description": "Multiple heap buffer overflows and an array indexing error were found in the GStreamer's QuickTime media file format decoding plugin. An attacker could create a carefully-crafted QuickTime media .mov file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAfter installing the update, all applications using GStreamer (such as totem or rhythmbox) must be restarted for the changes to take effect.", "modified": "2019-01-02T00:00:00", "id": "SL_20090206_GSTREAMER_PLUGINS_GOOD_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=60530", "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : gstreamer-plugins-good on SL5.x i386/x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(60530);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/01/02 10:36:42\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n\n script_name(english:\"Scientific Linux Security Update : gstreamer-plugins-good on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple heap buffer overflows and an array indexing error were found\nin the GStreamer's QuickTime media file format decoding plugin. An\nattacker could create a carefully-crafted QuickTime media .mov file\nthat would cause an application using GStreamer to crash or,\npotentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAfter installing the update, all applications using GStreamer (such as\ntotem or rhythmbox) must be restarted for the changes to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0902&L=scientific-linux-errata&T=0&P=1522\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6a32014d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected gstreamer-plugins-good and / or\ngstreamer-plugins-good-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"gstreamer-plugins-good-0.10.9-1.el5_3.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"gstreamer-plugins-good-devel-0.10.9-1.el5_3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:11:29", "bulletinFamily": "scanner", "description": "Updated gstreamer-plugins-good packages that fix several security issues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nGStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, GStreamer plug-ins of good quality released under the LGPL license.\n\nMultiple heap buffer overflows and an array indexing error were found in the GStreamer's QuickTime media file format decoding plugin. An attacker could create a carefully-crafted QuickTime media .mov file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all applications using GStreamer (such as totem or rhythmbox) must be restarted for the changes to take effect.", "modified": "2018-11-27T00:00:00", "id": "REDHAT-RHSA-2009-0271.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=35617", "published": "2009-02-09T00:00:00", "title": "RHEL 5 : gstreamer-plugins-good (RHSA-2009:0271)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0271. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(35617);\n script_version (\"1.22\");\n script_cvs_date(\"Date: 2018/11/27 13:31:32\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_bugtraq_id(33405);\n script_xref(name:\"RHSA\", value:\"2009:0271\");\n\n script_name(english:\"RHEL 5 : gstreamer-plugins-good (RHSA-2009:0271)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated gstreamer-plugins-good packages that fix several security\nissues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nGStreamer is a streaming media framework, based on graphs of filters\nwhich operate on media data. GStreamer Good Plug-ins is a collection\nof well-supported, GStreamer plug-ins of good quality released under\nthe LGPL license.\n\nMultiple heap buffer overflows and an array indexing error were found\nin the GStreamer's QuickTime media file format decoding plugin. An\nattacker could create a carefully-crafted QuickTime media .mov file\nthat would cause an application using GStreamer to crash or,\npotentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. After installing the update, all applications using GStreamer\n(such as totem or rhythmbox) must be restarted for the changes to take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0386\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2009:0271\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected gstreamer-plugins-good and / or\ngstreamer-plugins-good-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gstreamer-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gstreamer-plugins-good-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/02/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2009:0271\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"gstreamer-plugins-good-0.10.9-1.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"gstreamer-plugins-good-0.10.9-1.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"gstreamer-plugins-good-0.10.9-1.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"gstreamer-plugins-good-devel-0.10.9-1.el5_3.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-plugins-good / gstreamer-plugins-good-devel\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:19:20", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2009:0271 :\n\nUpdated gstreamer-plugins-good packages that fix several security issues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nGStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, GStreamer plug-ins of good quality released under the LGPL license.\n\nMultiple heap buffer overflows and an array indexing error were found in the GStreamer's QuickTime media file format decoding plugin. An attacker could create a carefully-crafted QuickTime media .mov file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all applications using GStreamer (such as totem or rhythmbox) must be restarted for the changes to take effect.", "modified": "2018-07-18T00:00:00", "id": "ORACLELINUX_ELSA-2009-0271.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=67804", "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : gstreamer-plugins-good (ELSA-2009-0271)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2009:0271 and \n# Oracle Linux Security Advisory ELSA-2009-0271 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(67804);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/07/18 17:43:56\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_bugtraq_id(33405);\n script_xref(name:\"RHSA\", value:\"2009:0271\");\n\n script_name(english:\"Oracle Linux 5 : gstreamer-plugins-good (ELSA-2009-0271)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2009:0271 :\n\nUpdated gstreamer-plugins-good packages that fix several security\nissues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nGStreamer is a streaming media framework, based on graphs of filters\nwhich operate on media data. GStreamer Good Plug-ins is a collection\nof well-supported, GStreamer plug-ins of good quality released under\nthe LGPL license.\n\nMultiple heap buffer overflows and an array indexing error were found\nin the GStreamer's QuickTime media file format decoding plugin. An\nattacker could create a carefully-crafted QuickTime media .mov file\nthat would cause an application using GStreamer to crash or,\npotentially, execute arbitrary code if played by a victim.\n(CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these\nupdated packages, which contain backported patches to correct these\nissues. After installing the update, all applications using GStreamer\n(such as totem or rhythmbox) must be restarted for the changes to take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-February/000882.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gstreamer-plugins-good packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gstreamer-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gstreamer-plugins-good-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !eregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = eregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"gstreamer-plugins-good-0.10.9-1.el5_3.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"gstreamer-plugins-good-devel-0.10.9-1.el5_3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-plugins-good / gstreamer-plugins-good-devel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:11:49", "bulletinFamily": "scanner", "description": "It was discovered that GStreamer Good Plugins did not correctly handle malformed Composition Time To Sample (ctts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0386)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle malformed Sync Sample (aka stss) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0387)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle malformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0397).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-11-28T00:00:00", "id": "UBUNTU_USN-736-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=37956", "published": "2009-04-23T00:00:00", "title": "Ubuntu 7.10 / 8.04 LTS / 8.10 : gst-plugins-good0.10 vulnerabilities (USN-736-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-736-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(37956);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/28 22:47:45\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_bugtraq_id(33405);\n script_xref(name:\"USN\", value:\"736-1\");\n\n script_name(english:\"Ubuntu 7.10 / 8.04 LTS / 8.10 : gst-plugins-good0.10 vulnerabilities (USN-736-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that GStreamer Good Plugins did not correctly handle\nmalformed Composition Time To Sample (ctts) atom data in Quicktime\n(mov) movie files. If a user were tricked into opening a crafted mov\nfile, an attacker could execute arbitrary code with the privileges of\nthe user invoking the program. (CVE-2009-0386)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle\nmalformed Sync Sample (aka stss) atom data in Quicktime (mov) movie\nfiles. If a user were tricked into opening a crafted mov file, an\nattacker could cause a denial of service via application crash, or\npossibly execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2009-0387)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle\nmalformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie\nfiles. If a user were tricked into opening a crafted mov file, an\nattacker could execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2009-0397).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/736-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gstreamer0.10-esd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gstreamer0.10-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gstreamer0.10-plugins-good-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gstreamer0.10-plugins-good-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gstreamer0.10-pulseaudio\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2009-2018 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.10|8\\.04|8\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.10 / 8.04 / 8.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.10\", pkgname:\"gstreamer0.10-esd\", pkgver:\"0.10.6-0ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"gstreamer0.10-plugins-good\", pkgver:\"0.10.6-0ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"gstreamer0.10-plugins-good-dbg\", pkgver:\"0.10.6-0ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"gstreamer0.10-plugins-good-doc\", pkgver:\"0.10.6-0ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"gstreamer0.10-esd\", pkgver:\"0.10.7-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"gstreamer0.10-plugins-good\", pkgver:\"0.10.7-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"gstreamer0.10-plugins-good-dbg\", pkgver:\"0.10.7-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"gstreamer0.10-plugins-good-doc\", pkgver:\"0.10.7-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"gstreamer0.10-esd\", pkgver:\"0.10.10.4-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"gstreamer0.10-plugins-good\", pkgver:\"0.10.10.4-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"gstreamer0.10-plugins-good-dbg\", pkgver:\"0.10.10.4-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"gstreamer0.10-plugins-good-doc\", pkgver:\"0.10.10.4-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"gstreamer0.10-pulseaudio\", pkgver:\"0.10.10.4-1ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer0.10-esd / gstreamer0.10-plugins-good / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:11:32", "bulletinFamily": "scanner", "description": "Secunia reports :\n\nTobias Klein has reported some vulnerabilities in GStreamer Good Plug-ins, which can potentially be exploited by malicious people to compromise a vulnerable system.\n\nA boundary error occurs within the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'ctts' Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.\n\nAn array indexing error exists in the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'stss' Atom parsing. This can be exploited to corrupt memory via a specially crafted QuickTime media file.\n\nA boundary error occurs within the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'stts' Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.", "modified": "2018-11-21T00:00:00", "id": "FREEBSD_PKG_37A365ED126911DEA9640030843D3802.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=35936", "published": "2009-03-17T00:00:00", "title": "FreeBSD : gstreamer-plugins-good -- multiple memory overflows (37a365ed-1269-11de-a964-0030843d3802)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(35936);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/21 10:46:30\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_xref(name:\"Secunia\", value:\"33650\");\n\n script_name(english:\"FreeBSD : gstreamer-plugins-good -- multiple memory overflows (37a365ed-1269-11de-a964-0030843d3802)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Secunia reports :\n\nTobias Klein has reported some vulnerabilities in GStreamer Good\nPlug-ins, which can potentially be exploited by malicious people to\ncompromise a vulnerable system.\n\nA boundary error occurs within the 'qtdemux_parse_samples()' function\nin gst/gtdemux/qtdemux.c when performing QuickTime 'ctts' Atom\nparsing. This can be exploited to cause a heap-based buffer overflow\nvia a specially crafted QuickTime media file.\n\nAn array indexing error exists in the 'qtdemux_parse_samples()'\nfunction in gst/gtdemux/qtdemux.c when performing QuickTime 'stss'\nAtom parsing. This can be exploited to corrupt memory via a specially\ncrafted QuickTime media file.\n\nA boundary error occurs within the 'qtdemux_parse_samples()' function\nin gst/gtdemux/qtdemux.c when performing QuickTime 'stts' Atom\nparsing. This can be exploited to cause a heap-based buffer overflow\nvia a specially crafted QuickTime media file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://trapkit.de/advisories/TKADV2009-003.txt\"\n );\n # http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f6e78973\"\n );\n # https://vuxml.freebsd.org/freebsd/37a365ed-1269-11de-a964-0030843d3802.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fd380d4b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:gstreamer-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"gstreamer-plugins-good>=0.10.9,3<0.10.12,3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:12:05", "bulletinFamily": "scanner", "description": "gstreamer-0_10: several heap overflows (CVE-2009-0386, CVE-2009-0387,CVE-2009-0397) have been fixed. Remote attackers could exploit these to execute arbitrary code via QuickTime media files.", "modified": "2014-06-13T00:00:00", "id": "SUSE_11_0_GSTREAMER-0_10-PLUGINS-GOOD-090218.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=39977", "published": "2009-07-21T00:00:00", "title": "openSUSE Security Update : gstreamer-0_10-plugins-good (gstreamer-0_10-plugins-good-540)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update gstreamer-0_10-plugins-good-540.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(39977);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2014/06/13 19:38:13 $\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n\n script_name(english:\"openSUSE Security Update : gstreamer-0_10-plugins-good (gstreamer-0_10-plugins-good-540)\");\n script_summary(english:\"Check for the gstreamer-0_10-plugins-good-540 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"gstreamer-0_10: several heap overflows (CVE-2009-0386,\nCVE-2009-0387,CVE-2009-0397) have been fixed. Remote attackers could\nexploit these to execute arbitrary code via QuickTime media files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=469336\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gstreamer-0_10-plugins-good packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"gstreamer-0_10-plugins-good-0.10.7-38.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"gstreamer-0_10-plugins-good-extra-0.10.7-38.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"gstreamer-0_10-plugins-good-lang-0.10.7-38.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-0_10\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:11:30", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been found in gst-plugins-bad0.10, a collection of various GStreamer plugins. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2009-0386 Tobias Klein discovered a buffer overflow in the quicktime stream demuxer (qtdemux), which could potentially lead to the execution of arbitrary code via crafted .mov files.\n\n - CVE-2009-0387 Tobias Klein discovered an array index error in the quicktime stream demuxer (qtdemux), which could potentially lead to the execution of arbitrary code via crafted .mov files.\n\n - CVE-2009-0397 Tobias Klein discovered a buffer overflow in the quicktime stream demuxer (qtdemux) similar to the issue reported in CVE-2009-0386, which could also lead to the execution of arbitrary code via crafted .mov files.", "modified": "2018-11-10T00:00:00", "id": "DEBIAN_DSA-1729.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=35754", "published": "2009-03-03T00:00:00", "title": "Debian DSA-1729-1 : gst-plugins-bad0.10 - several vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1729. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(35754);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/11/10 11:49:33\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n script_bugtraq_id(33405);\n script_xref(name:\"DSA\", value:\"1729\");\n\n script_name(english:\"Debian DSA-1729-1 : gst-plugins-bad0.10 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been found in gst-plugins-bad0.10, a\ncollection of various GStreamer plugins. The Common Vulnerabilities\nand Exposures project identifies the following problems :\n\n - CVE-2009-0386\n Tobias Klein discovered a buffer overflow in the\n quicktime stream demuxer (qtdemux), which could\n potentially lead to the execution of arbitrary code via\n crafted .mov files.\n\n - CVE-2009-0387\n Tobias Klein discovered an array index error in the\n quicktime stream demuxer (qtdemux), which could\n potentially lead to the execution of arbitrary code via\n crafted .mov files.\n\n - CVE-2009-0397\n Tobias Klein discovered a buffer overflow in the\n quicktime stream demuxer (qtdemux) similar to the issue\n reported in CVE-2009-0386, which could also lead to the\n execution of arbitrary code via crafted .mov files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-0386\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-0387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-0397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-0386\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2009/dsa-1729\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"For the oldstable distribution (etch), these problems have been fixed\nin version 0.10.3-3.1+etch1.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 0.10.8-4.1~lenny1 of gst-plugins-good0.10, since the affected\nplugin has been moved there. The fix was already included in the lenny\nrelease.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:gst-plugins-bad0.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"gstreamer0.10-plugins-bad\", reference:\"0.10.3-3.1+etch1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"gst-plugins-bad0.10\", reference:\"0.10.8-4.1~lenny1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:12:10", "bulletinFamily": "scanner", "description": "gstreamer-0_10: several heap overflows (CVE-2009-0386, CVE-2009-0387,CVE-2009-0397) have been fixed. Remote attackers could exploit these to execute arbitrary code via QuickTime media files.", "modified": "2014-06-13T00:00:00", "id": "SUSE_11_1_GSTREAMER-0_10-PLUGINS-GOOD-090218.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=40227", "published": "2009-07-21T00:00:00", "title": "openSUSE Security Update : gstreamer-0_10-plugins-good (gstreamer-0_10-plugins-good-540)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update gstreamer-0_10-plugins-good-540.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(40227);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2014/06/13 19:49:34 $\");\n\n script_cve_id(\"CVE-2009-0386\", \"CVE-2009-0387\", \"CVE-2009-0397\");\n\n script_name(english:\"openSUSE Security Update : gstreamer-0_10-plugins-good (gstreamer-0_10-plugins-good-540)\");\n script_summary(english:\"Check for the gstreamer-0_10-plugins-good-540 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"gstreamer-0_10: several heap overflows (CVE-2009-0386,\nCVE-2009-0387,CVE-2009-0397) have been fixed. Remote attackers could\nexploit these to execute arbitrary code via QuickTime media files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=469336\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gstreamer-0_10-plugins-good packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gstreamer-0_10-plugins-good-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"gstreamer-0_10-plugins-good-0.10.10-3.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"gstreamer-0_10-plugins-good-extra-0.10.10-3.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"gstreamer-0_10-plugins-good-lang-0.10.10-3.21.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gstreamer-0_10\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2018-08-31T01:15:27", "bulletinFamily": "unix", "description": "\nSecunia reports:\n\nTobias Klein has reported some vulnerabilities in GStreamer Good\n\t Plug-ins, which can potentially be exploited by malicious people to\n\t compromise a vulnerable system.\nA boundary error occurs within the \"qtdemux_parse_samples()\"\n\t function in gst/gtdemux/qtdemux.c when performing QuickTime \"ctts\"\n\t Atom parsing. This can be exploited to cause a heap-based buffer\n\t overflow via a specially crafted QuickTime media file.\nAn array indexing error exists in the \"qtdemux_parse_samples()\"\n\t function in gst/gtdemux/qtdemux.c when performing QuickTime \"stss\"\n\t Atom parsing. This can be exploited to corrupt memory via a specially\n\t crafted QuickTime media file.\nA boundary error occurs within the \"qtdemux_parse_samples()\"\n\t function in gst/gtdemux/qtdemux.c when performing QuickTime \"stts\"\n\t Atom parsing. This can be exploited to cause a heap-based buffer\n\t overflow via a specially crafted QuickTime media file.\n\n", "modified": "2009-01-22T00:00:00", "published": "2009-01-22T00:00:00", "id": "37A365ED-1269-11DE-A964-0030843D3802", "href": "https://vuxml.freebsd.org/freebsd/37a365ed-1269-11de-a964-0030843d3802.html", "title": "gstreamer-plugins-good -- multiple memory overflows", "type": "freebsd", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2018-12-11T17:44:44", "bulletinFamily": "unix", "description": "GStreamer is a streaming media framework, based on graphs of filters which\noperate on media data. GStreamer Good Plug-ins is a collection of\nwell-supported, GStreamer plug-ins of good quality released under the LGPL\nlicense.\n\nMultiple heap buffer overflows and an array indexing error were found in\nthe GStreamer's QuickTime media file format decoding plugin. An attacker\ncould create a carefully-crafted QuickTime media .mov file that would cause\nan application using GStreamer to crash or, potentially, execute arbitrary\ncode if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)\n\nAll users of gstreamer-plugins-good are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling the update, all applications using GStreamer (such as totem or\nrhythmbox) must be restarted for the changes to take effect.", "modified": "2017-09-08T11:59:50", "published": "2009-02-06T05:00:00", "id": "RHSA-2009:0271", "href": "https://access.redhat.com/errata/RHSA-2009:0271", "type": "redhat", "title": "(RHSA-2009:0271) Important: gstreamer-plugins-good security update", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2018-10-16T22:13:02", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1729-1 security@debian.org\nhttp://www.debian.org/security/ Noah Meyerhans\nMarch 02, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : gst-plugins-bad0.10\nVulnerability : several vulnerabilities\nProblem type : local (remote)\nDebian-specific: no\nCVE Id : CVE-2009-0386 CVE-2009-0387 CVE-2009-0397\n\nSeveral vulnerabilities have been found in gst-plugins-bad0.10, a\ncollection of various GStreamer plugins. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2009-0386\n\nTobias Klein discovered a buffer overflow in the quicktime stream\ndemuxer (qtdemux), which could potentially lead to the execution of\narbitrary code via crafted .mov files.\n\nCVE-2009-0387\n\nTobias Klein discovered an array index error in the quicktime stream\ndemuxer (qtdemux), which could potentially lead to the execution of\narbitrary code via crafted .mov files.\n\nCVE-2009-0397\n\nTobias Klein discovered a buffer overflow in the quicktime stream\ndemuxer (qtdemux) similar to the issue reported in CVE-2009-0386, which\ncould also lead to the execution of arbitrary code via crafted .mov\nfiles.\n\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 0.10.8-4.1~lenny1 of gst-plugins-good0.10, since the affected\nplugin has been moved there. The fix was already included in the lenny\nrelease.\n\nFor the oldstable distribution (etch), these problems have been fixed in\nversion 0.10.3-3.1+etch1.\n\nFor the unstable distribution (sid) and the testing distribution\n(squeeze), these problems have been fixed in version 0.10.8-4.1 of\ngst-plugins-good0.10.\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3-3.1+etch1.dsc\n Size/MD5 checksum: 819 3a44313023fb5a930247b5b981e700ae\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3.orig.tar.gz\n Size/MD5 checksum: 1377759 6d09962ac9ae6218932578ccc623407f\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gst-plugins-bad0.10_0.10.3-3.1+etch1.diff.gz\n Size/MD5 checksum: 9477 74cfd15f0e32f3b56509e648953fdec8\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_alpha.deb\n Size/MD5 checksum: 733630 5a57a10505b41e4c28bc4e0642f8650a\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_amd64.deb\n Size/MD5 checksum: 549878 cd0413ebf02e178ea27c5c8d16ad95fa\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_arm.deb\n Size/MD5 checksum: 561194 a0724a6cab918a8da823d7bf46443ef1\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_i386.deb\n Size/MD5 checksum: 552386 5925c3bdbbb3d1f498653ca201112ca0\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_ia64.deb\n Size/MD5 checksum: 832140 365297044bf80b32378e97fa3657f201\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_mips.deb\n Size/MD5 checksum: 619356 053cceaa42b6c38dc1cc1d64a8d3e7bd\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_mipsel.deb\n Size/MD5 checksum: 600068 09cf53d117f6c449664d96bba3e3fc9a\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_powerpc.deb\n Size/MD5 checksum: 600966 6a0e5ed57d4da5875040be8cc96345f5\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_s390.deb\n Size/MD5 checksum: 580644 1bdfe57a99a1b2398fe163421d97cc9d\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/g/gst-plugins-bad0.10/gstreamer0.10-plugins-bad_0.10.3-3.1+etch1_sparc.deb\n Size/MD5 checksum: 576270 cbe44fa23352da55f24506ee60262bfd\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2009-03-02T20:38:07", "published": "2009-03-02T20:38:07", "id": "DEBIAN:DSA-1729-1:53273", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00039.html", "title": "[SECURITY] [DSA 1729-1] New gst-plugins-bad0.10 packages fix multiple vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2018-08-31T01:41:25", "bulletinFamily": "unix", "description": "[0.10.9-1.el5.1]\n- Add patch for CVE-2009-0386 CVE-2009-0387 CVE-2009-0397\nRelated: rhbz #483220", "modified": "2009-02-06T00:00:00", "published": "2009-02-06T00:00:00", "id": "ELSA-2009-0271", "href": "http://linux.oracle.com/errata/ELSA-2009-0271.html", "title": "gstreamer-plugins-good security update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:10:08", "bulletinFamily": "unix", "description": "It was discovered that GStreamer Good Plugins did not correctly handle malformed Composition Time To Sample (ctts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0386)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle malformed Sync Sample (aka stss) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0387)\n\nIt was discovered that GStreamer Good Plugins did not correctly handle malformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0397)", "modified": "2009-03-16T00:00:00", "published": "2009-03-16T00:00:00", "id": "USN-736-1", "href": "https://usn.ubuntu.com/736-1/", "title": "GStreamer Good Plugins vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:20", "bulletinFamily": "unix", "description": "### Background\n\nThe GStreamer plug-ins provide decoders to the GStreamer open source media framework. \n\n### Description\n\nMultiple vulnerabilities have been reported in several GStreamer plug-ins: \n\n * Tobias Klein reported two heap-based buffer overflows and an array index error in the qtdemux_parse_samples() function in gst-plugins-good when processing a QuickTime media .mov file (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397). \n * Thomas Hoger of the Red Hat Security Response Team reported an integer overflow that can lead to a heap-based buffer overflow in the gst_vorbis_tag_add_coverart() function in gst-plugins-base when processing COVERART tags (CVE-2009-0586). \n * Tielei Wang of ICST-ERCIS, Peking University reported multiple integer overflows leading to buffer overflows in gst-plugins-libpng when processing a PNG file (CVE-2009-1932). \n\n### Impact\n\nA remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll gst-plugins-good users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-libs/gst-plugins-good-0.10.14\"\n\nAll gst-plugins-base users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-libs/gst-plugins-base-0.10.22\"\n\nAll gst-plugins-libpng users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-plugins/gst-plugins-libpng-0.10.14-r1\"", "modified": "2009-07-12T00:00:00", "published": "2009-07-12T00:00:00", "id": "GLSA-200907-11", "href": "https://security.gentoo.org/glsa/200907-11", "type": "gentoo", "title": "GStreamer plug-ins: User-assisted execution of arbitrary code", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}