Lucene search

K
redhatcveRedhat.comRH:CVE-2023-37327
HistoryDec 14, 2023 - 12:27 p.m.

CVE-2023-37327

2023-12-1412:27:39
redhat.com
access.redhat.com
11
cve-2023-37327
heap-based buffer overflow
flac parser
gstreamer
malicious third party
crash
potential code execution
mitigation
red hat
product security

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

7.4 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

16.3%

A heap-based buffer overflow vulnerability was found in the FLAC parser in GStreamer. This issue occurs when processing malformed image tags, which could allow a malicious third party to induce a crash in the application and potentially execute code by manipulating the heap.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

7.4 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

16.3%