First published: Thu Jan 22 2009(Updated: )
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer Good Plug-ins | =0.10.10 | |
GStreamer Plug-ins | =0.8.5 | |
GStreamer Good Plug-ins | =0.10.9 | |
GStreamer Good Plug-ins | =0.10.11 | |
redhat/gstreamer-plugins-good | <0:0.10.9-1.el5_3.1 | 0:0.10.9-1.el5_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.