CVE-2016-9809
gstreamer-plugins-bad-free: Off-by-one read in gst_h264_parse_set_caps
Severity Score
7.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
Error por un paso en la función gst_h264_parse_set_caps en GStreamer en versiones anteriores a 1.10.2 permite a atacantes remotos tener un impacto no especificado a través de un archivo manipulado, lo que desencadena una lectura fuera de límites.
An out-of-bounds heap read flaw was found in GStreamer's H.264 parser. A remote attacker could use this flaw to cause an application using GStreamer to crash.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2016-12-04 CVE Reserved
- 2017-01-05 CVE Published
- 2023-05-31 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
- CWE-193: Off-by-one Error
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/12/01/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2016/12/05/8 | Mailing List | |
http://www.securityfocus.com/bid/95147 | Third Party Advisory | |
https://bugzilla.gnome.org/show_bug.cgi?id=774896 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0018.html | 2018-01-05 | |
http://rhn.redhat.com/errata/RHSA-2017-0021.html | 2018-01-05 | |
http://www.debian.org/security/2017/dsa-3818 | 2018-01-05 | |
https://gstreamer.freedesktop.org/releases/1.10/#1.10.2 | 2018-01-05 | |
https://security.gentoo.org/glsa/201705-10 | 2018-01-05 | |
https://access.redhat.com/security/cve/CVE-2016-9809 | 2017-01-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1401880 | 2017-01-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gstreamer Search vendor "Gstreamer" | Gstreamer Search vendor "Gstreamer" for product "Gstreamer" | <= 1.10.1 Search vendor "Gstreamer" for product "Gstreamer" and version " <= 1.10.1" | - |
Affected
|