First published: Mon Feb 02 2009(Updated: )
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer | =0.10.10 | |
GStreamer | =0.10.9 | |
GStreamer | =0.10.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0386 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2009-0386, you should upgrade to GStreamer Good Plug-ins version 0.10.12 or later.
CVE-2009-0386 affects GStreamer Good Plug-ins versions 0.10.9, 0.10.10, and 0.10.11.
CVE-2009-0386 involves a heap-based buffer overflow that can be exploited by sending specially crafted QuickTime files.
Yes, CVE-2009-0386 can be exploited remotely, allowing attackers to execute arbitrary code on the affected system.