Lucene search

K
freebsdFreeBSD37A365ED-1269-11DE-A964-0030843D3802
HistoryJan 22, 2009 - 12:00 a.m.

gstreamer-plugins-good -- multiple memory overflows

2009-01-2200:00:00
vuxml.freebsd.org
12

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.437 Medium

EPSS

Percentile

97.3%

Secunia reports:

Tobias Klein has reported some vulnerabilities in GStreamer Good
Plug-ins, which can potentially be exploited by malicious people to
compromise a vulnerable system.
A boundary error occurs within the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “ctts”
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.
An array indexing error exists in the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “stss”
Atom parsing. This can be exploited to corrupt memory via a specially
crafted QuickTime media file.
A boundary error occurs within the “qtdemux_parse_samples()”
function in gst/gtdemux/qtdemux.c when performing QuickTime “stts”
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgstreamer-plugins-good= 0.10.9,3UNKNOWN
FreeBSDanynoarchgstreamer-plugins-good< 0.10.12,3UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.437 Medium

EPSS

Percentile

97.3%