mirror of
https://gitlab.freedesktop.org/gstreamer/gstreamer.git
synced 2024-12-04 23:46:43 +00:00
95ca7014c8
Ship these also as part of the monorepo, so we can prepare new advisories as part of the relevant merge requests in the private gstreamer-security repository. Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
1.4 KiB
1.4 KiB
Security Advisory 2019-0001 (CVE-2019-9928)
Summary | Buffer overflow in RTSP parsing |
Date | 2019-04-22 00:30 |
Affected Versions | GStreamer gst-plugins-bad |
IDs | GStreamer-SA-2019-0001 CVE-2019-9928 |
Details
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server.
Impact
The potential exists for a malicious server to trigger remote code execution in a connecting client.
Threat mitigation
Exploitation requires the user to access a malicious RTSP server.
Workarounds
The user should refrain from opening RTSP streams from untrusted third parties
Solution
The gst-plugins-base 1.16.0 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.