gstreamer/security-advisories/sa-2016-0001.md
Tim-Philipp Müller 95ca7014c8 security-advisories: import from www module
Ship these also as part of the monorepo, so we can prepare
new advisories as part of the relevant merge requests in
the private gstreamer-security repository.

Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
2024-10-04 19:18:45 +00:00

2 KiB

Security Advisory 2016-0001 (CVE-2016-9445, CVE-2016-9446)

Summary Multiple Issues in VMNC decoder
Date 2016-11-17 16:00
Affected Versions GStreamer gst-plugins-bad 1.10 < 1.10.1
GStreamer gst-plugins-bad 1.x <= 1.8.3
IDs GStreamer-SA-2016-0001
CVE-2016-9445
CVE-2016-9446

Details

The VMNC decoder in gst-plugins-bad contains an integer overflow vulnerability and a failure to initialize output memory.

Impact

If successful, a malicious third party could trigger either a crash in an application decoding a VMNC video stream or an arbitrary code execution with the privileges of the target user. The failure to initialize output memory may result in an information leak.

Mitigation

Exploitation requires the user to access a VMNC stream or file.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites, or disable the VMNC decoder plugin by removing the plugin binary file libgstvmnc.so or libgstvmnc.dll.

Solution

The gst-plugins-bad 1.10.1 release addresses the issue. The upcoming gst-plugins-bad 1.8.4 release will also address the issue. People using older branches of GStreamer should apply the patch and recompile, or disable the VMNC plugin.

References

The GStreamer project

CVE Database Entries

GStreamer Bugzilla Entry

GStreamer Patches