gst-plugins-base is vulnerable to remote code execution. The vulnerability exists as GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server.
CPE | Name | Operator | Version |
---|---|---|---|
gst-plugins-base | eq | 1.14.4-r0 | |
gst-plugins-base | eq | 1.14.4-r0 |
lists.opensuse.org/opensuse-security-announce/2019-06/msg00078.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00082.html
lists.opensuse.org/opensuse-security-announce/2020-05/msg00049.html
gstreamer.freedesktop.org/security/
gstreamer.freedesktop.org/security/sa-2019-0001.html
lists.debian.org/debian-lts-announce/2019/04/msg00030.html
lists.debian.org/debian-lts-announce/2019/04/msg00031.html
seclists.org/bugtraq/2019/Apr/39
security.gentoo.org/glsa/202003-33
usn.ubuntu.com/3958-1/
www.debian.org/security/2019/dsa-4437