Vulnerabilities > CVE-2016-9809 - Out-of-bounds Read vulnerability in Gstreamer 1.10.1
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overread Buffers An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201705-10.NASL description The remote host is affected by the vulnerability described in GLSA-201705-10 (GStreamer plug-ins: User-assisted execution of arbitrary code) Multiple vulnerabilities have been discovered in various GStreamer plug-ins. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 100263 published 2017-05-18 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/100263 title GLSA-201705-10 : GStreamer plug-ins: User-assisted execution of arbitrary code NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-85.NASL description This update for gstreamer-0_10-plugins-bad fixes the following issue : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659) last seen 2020-06-05 modified 2017-01-17 plugin id 96551 published 2017-01-17 reporter This script is Copyright (C) 2017-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/96551 title openSUSE Security Update : gstreamer-0_10-plugins-bad (openSUSE-2017-85) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-3818.NASL description Hanno Boeck discovered multiple vulnerabilities in the GStreamer media framework and its codecs and demuxers, which may result in denial of service or the execution of arbitrary code if a malformed media file is opened. last seen 2020-06-01 modified 2020-06-02 plugin id 99004 published 2017-03-28 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/99004 title Debian DSA-3818-1 : gst-plugins-bad1.0 - security update NASL family SuSE Local Security Checks NASL id SUSE_SU-2016-3296-1.NASL description This update for gstreamer-plugins-bad fixes the following security issues, which would allow attackers able to submit media files for indexing to cause code execution or crashes : - Check an integer overflow (CVE-2016-9445) and initialize a buffer (CVE-2016-9446) in vmncdec. (bsc#1010829) - CVE-2016-9809: Ensure codec_data has the right size when reading number of SPS (bsc#1013659). - CVE-2016-9812: Add more section size checks (bsc#1013678). - CVE-2016-9813: fix PAT parsing (bsc#1013680). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 96258 published 2017-01-03 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96258 title SUSE SLED12 / SLES12 Security Update : gstreamer-plugins-bad (SUSE-SU-2016:3296-1) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2017-1009.NASL description According to the versions of the gstreamer-plugins-bad-free package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-05-06 modified 2017-05-01 plugin id 99855 published 2017-05-01 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/99855 title EulerOS 2.0 SP2 : gstreamer-plugins-bad-free (EulerOS-SA-2017-1009) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2017-0021.NASL description An update for gstreamer1-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96342 published 2017-01-10 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96342 title CentOS 7 : gstreamer1-plugins-bad-free (CESA-2017:0021) NASL family SuSE Local Security Checks NASL id SUSE_SU-2017-0331-1.NASL description gstreamer-0_10-plugins-bad was udpated to fix one issue. This security issue was fixed : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 96902 published 2017-01-31 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96902 title SUSE SLED12 Security Update : gstreamer-0_10-plugins-bad (SUSE-SU-2017:0331-1) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2017-0021.NASL description From Red Hat Security Advisory 2017:0021 : An update for gstreamer1-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96329 published 2017-01-06 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96329 title Oracle Linux 7 : gstreamer1-plugins-bad-free (ELSA-2017-0021) NASL family Debian Local Security Checks NASL id DEBIAN_DLA-2164.NASL description Several issues have been found in gst-plugins-bad0.10, a package containing GStreamer plugins from the last seen 2020-04-07 modified 2020-04-02 plugin id 135099 published 2020-04-02 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135099 title Debian DLA-2164-1 : gst-plugins-bad0.10 security update NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2017-0018.NASL description From Red Hat Security Advisory 2017:0018 : An update for gstreamer-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96326 published 2017-01-06 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96326 title Oracle Linux 7 : gstreamer-plugins-bad-free (ELSA-2017-0018) NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-208.NASL description This update for gstreamer-0_10-plugins-bad fixes the following issue : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659) This update was imported from the SUSE:SLE-12-SP2:Update update project. last seen 2020-06-05 modified 2017-02-06 plugin id 97005 published 2017-02-06 reporter This script is Copyright (C) 2017-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/97005 title openSUSE Security Update : gstreamer-0_10-plugins-bad (openSUSE-2017-208) NASL family Virtuozzo Local Security Checks NASL id VIRTUOZZO_VZLSA-2017-0021.NASL description An update for gstreamer1-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 101404 published 2017-07-13 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/101404 title Virtuozzo 7 : gstreamer1-plugins-bad-free / etc (VZLSA-2017-0021) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2017-0018.NASL description An update for gstreamer-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96339 published 2017-01-10 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96339 title CentOS 7 : gstreamer-plugins-bad-free (CESA-2017:0018) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2017-0018.NASL description An update for gstreamer-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96310 published 2017-01-05 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96310 title RHEL 7 : gstreamer-plugins-bad-free (RHSA-2017:0018) NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-84.NASL description This update for gstreamer-plugins-bad fixes the following issues : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659). - CVE-2016-9812: Out of bounds read in gst_mpegts_section_new (bsc#1013678). - CVE-2016-9813: mpegts parser: NULL pointer deref in _parse_pat (bsc#1013680). last seen 2020-06-05 modified 2017-01-17 plugin id 96550 published 2017-01-17 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96550 title openSUSE Security Update : gstreamer-plugins-bad (openSUSE-2017-84) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2017-1007.NASL description According to the versions of the gstreamer1-plugins-bad-free package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-05-06 modified 2017-05-01 plugin id 99853 published 2017-05-01 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/99853 title EulerOS 2.0 SP2 : gstreamer1-plugins-bad-free (EulerOS-SA-2017-1007) NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-152.NASL description This update for gstreamer-0_10-plugins-bad fixes the following issue : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659) last seen 2020-06-05 modified 2017-01-27 plugin id 96823 published 2017-01-27 reporter This script is Copyright (C) 2017-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/96823 title openSUSE Security Update : gstreamer-0_10-plugins-bad (openSUSE-2017-152) NASL family Fedora Local Security Checks NASL id FEDORA_2016-9C63B652A8.NASL description vmncdec: Sanity-check width/height before using it Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2016-12-12 plugin id 95681 published 2016-12-12 reporter This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/95681 title Fedora 25 : gstreamer-plugins-bad-free (2016-9c63b652a8) NASL family Virtuozzo Local Security Checks NASL id VIRTUOZZO_VZLSA-2017-0018.NASL description An update for gstreamer-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 101401 published 2017-07-13 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/101401 title Virtuozzo 7 : gstreamer-plugins-bad-free / etc (VZLSA-2017-0018) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2017-1010.NASL description According to the versions of the gstreamer-plugins-bad-free packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-05-06 modified 2017-05-01 plugin id 99856 published 2017-05-01 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/99856 title EulerOS 2.0 SP1 : gstreamer-plugins-bad-free (EulerOS-SA-2017-1010) NASL family SuSE Local Security Checks NASL id SUSE_SU-2017-0330-1.NASL description This update for gstreamer-0_10-plugins-bad fixes the following issue : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 96901 published 2017-01-31 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96901 title SUSE SLED12 Security Update : gstreamer-0_10-plugins-bad (SUSE-SU-2017:0330-1) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2017-1008.NASL description According to the versions of the gstreamer1-plugins-bad-free package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-05-06 modified 2017-05-01 plugin id 99854 published 2017-05-01 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/99854 title EulerOS 2.0 SP1 : gstreamer1-plugins-bad-free (EulerOS-SA-2017-1008) NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-63.NASL description This update for gstreamer-plugins-bad fixes the following security issues, which would allow attackers able to submit media files for indexing to cause code execution or crashes : - Check an integer overflow (CVE-2016-9445) and initialize a buffer (CVE-2016-9446) in vmncdec. (bsc#1010829) - CVE-2016-9809: Ensure codec_data has the right size when reading number of SPS (bsc#1013659). - CVE-2016-9812: Add more section size checks (bsc#1013678). - CVE-2016-9813: fix PAT parsing (bsc#1013680). This update was imported from the SUSE:SLE-12-SP2:Update update project. last seen 2020-06-05 modified 2017-01-10 plugin id 96382 published 2017-01-10 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96382 title openSUSE Security Update : gstreamer-plugins-bad (openSUSE-2017-63) NASL family Debian Local Security Checks NASL id DEBIAN_DLA-736.NASL description An out of bounds heap bug was found in the H264 parser in gst-plugins-bad0.10. For Debian 7 last seen 2020-03-17 modified 2016-12-08 plugin id 95635 published 2016-12-08 reporter This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/95635 title Debian DLA-736-1 : gst-plugins-bad0.10 security update NASL family SuSE Local Security Checks NASL id SUSE_SU-2016-3297-1.NASL description This update for gstreamer-plugins-bad fixes the following issues : - CVE-2016-9809: Malicious mkv/h264 file could cause an off by one out of bounds read and lead to crash (bsc#1013659) - CVE-2016-9812: Malicious mpeg file could cause invalid a NULL pointer access and lead to crash (bsc#1013678) - CVE-2016-9813: Malicious mpegts file could cause invalid a NULL pointer access and lead to crash (bsc#1013680) - CVE-2016-9445, CVE-2016-9446: Check an integer overflow and initialize a buffer in vmncdec (bsc#1010829) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 96259 published 2017-01-03 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96259 title SUSE SLED12 / SLES12 Security Update : gstreamer-plugins-bad (SUSE-SU-2016:3297-1) NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-94.NASL description This update for gstreamer-plugins-bad fixes the following issues : - CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659). - CVE-2016-9812: Out of bounds read in gst_mpegts_section_new (bsc#1013678). - CVE-2016-9813: mpegts parser: NULL pointer deref in _parse_pat (bsc#1013680). last seen 2020-06-05 modified 2017-01-17 plugin id 96558 published 2017-01-17 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96558 title openSUSE Security Update : gstreamer-plugins-bad (openSUSE-2017-94) NASL family Fedora Local Security Checks NASL id FEDORA_2016-A3BC78DE2B.NASL description vmncdec: Sanity-check width/height before using it ---- Remove insecure nsf plugin (#1395126) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2016-12-16 plugin id 95902 published 2016-12-16 reporter This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/95902 title Fedora 24 : gstreamer-plugins-bad-free (2016-a3bc78de2b) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2017-0021.NASL description An update for gstreamer1-plugins-bad-free is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es) : * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-06-01 modified 2020-06-02 plugin id 96313 published 2017-01-05 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96313 title RHEL 7 : gstreamer1-plugins-bad-free (RHSA-2017:0021) NASL family Fedora Local Security Checks NASL id FEDORA_2016-CA6CC3CE3E.NASL description Fix h264 and h265 parser size checks Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2016-12-12 plugin id 95687 published 2016-12-12 reporter This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/95687 title Fedora 24 : gstreamer1-plugins-bad-free (2016-ca6cc3ce3e) NASL family Scientific Linux Local Security Checks NASL id SL_20170105_GSTREAMER_PLUGINS_BAD_FREE_ON_SL7_X.NASL description Security Fix(es) : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-03-18 modified 2017-01-06 plugin id 96332 published 2017-01-06 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96332 title Scientific Linux Security Update : gstreamer-plugins-bad-free on SL7.x x86_64 (20170105) NASL family Scientific Linux Local Security Checks NASL id SL_20170105_GSTREAMER1_PLUGINS_BAD_FREE_ON_SL7_X.NASL description Security Fix(es) : - An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer last seen 2020-03-18 modified 2017-01-06 plugin id 96330 published 2017-01-06 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96330 title Scientific Linux Security Update : gstreamer1-plugins-bad-free on SL7.x x86_64 (20170105)
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://rhn.redhat.com/errata/RHSA-2017-0018.html
- http://rhn.redhat.com/errata/RHSA-2017-0018.html
- http://rhn.redhat.com/errata/RHSA-2017-0021.html
- http://rhn.redhat.com/errata/RHSA-2017-0021.html
- http://www.debian.org/security/2017/dsa-3818
- http://www.debian.org/security/2017/dsa-3818
- http://www.openwall.com/lists/oss-security/2016/12/01/2
- http://www.openwall.com/lists/oss-security/2016/12/01/2
- http://www.openwall.com/lists/oss-security/2016/12/05/8
- http://www.openwall.com/lists/oss-security/2016/12/05/8
- http://www.securityfocus.com/bid/95147
- http://www.securityfocus.com/bid/95147
- https://bugzilla.gnome.org/show_bug.cgi?id=774896
- https://bugzilla.gnome.org/show_bug.cgi?id=774896
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html
- https://security.gentoo.org/glsa/201705-10
- https://security.gentoo.org/glsa/201705-10