GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 18.10 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
gstreamer | lt | 1.16.0 |
lists.opensuse.org/opensuse-security-announce/2019-06/msg00078.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00082.html
lists.opensuse.org/opensuse-security-announce/2020-05/msg00049.html
gstreamer.freedesktop.org/security/
gstreamer.freedesktop.org/security/sa-2019-0001.html
lists.debian.org/debian-lts-announce/2019/04/msg00030.html
lists.debian.org/debian-lts-announce/2019/04/msg00031.html
seclists.org/bugtraq/2019/Apr/39
security.gentoo.org/glsa/202003-33
usn.ubuntu.com/3958-1/
www.debian.org/security/2019/dsa-4437