gstreamer/security-advisories/sa-2019-0001.md
Tim-Philipp Müller 95ca7014c8 security-advisories: import from www module
Ship these also as part of the monorepo, so we can prepare
new advisories as part of the relevant merge requests in
the private gstreamer-security repository.

Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
2024-10-04 19:18:45 +00:00

1.4 KiB

Security Advisory 2019-0001 (CVE-2019-9928)

Summary Buffer overflow in RTSP parsing
Date 2019-04-22 00:30
Affected Versions GStreamer gst-plugins-bad
IDs GStreamer-SA-2019-0001
CVE-2019-9928

Details

GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server.

Impact

The potential exists for a malicious server to trigger remote code execution in a connecting client.

Threat mitigation

Exploitation requires the user to access a malicious RTSP server.

Workarounds

The user should refrain from opening RTSP streams from untrusted third parties

Solution

The gst-plugins-base 1.16.0 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.

References

The GStreamer project

CVE Database Entries

GStreamer 1.16.0 release

Patches