Ship these also as part of the monorepo, so we can prepare new advisories as part of the relevant merge requests in the private gstreamer-security repository. Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
2 KiB
Security Advisory 2016-0001 (CVE-2016-9445, CVE-2016-9446)
Summary | Multiple Issues in VMNC decoder |
Date | 2016-11-17 16:00 |
Affected Versions | GStreamer gst-plugins-bad 1.10 < 1.10.1 GStreamer gst-plugins-bad 1.x <= 1.8.3 |
IDs | GStreamer-SA-2016-0001 CVE-2016-9445 CVE-2016-9446 |
Details
The VMNC decoder in gst-plugins-bad contains an integer overflow vulnerability and a failure to initialize output memory.
Impact
If successful, a malicious third party could trigger either a crash in an application decoding a VMNC video stream or an arbitrary code execution with the privileges of the target user. The failure to initialize output memory may result in an information leak.
Mitigation
Exploitation requires the user to access a VMNC stream or file.
Workarounds
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites, or disable the VMNC decoder plugin by removing the plugin binary file libgstvmnc.so or libgstvmnc.dll.
Solution
The gst-plugins-bad 1.10.1 release addresses the issue. The upcoming gst-plugins-bad 1.8.4 release will also address the issue. People using older branches of GStreamer should apply the patch and recompile, or disable the VMNC plugin.