First published: Thu Jan 22 2009(Updated: )
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gstreamer-plugins-good | <0:0.10.9-1.el5_3.1 | 0:0.10.9-1.el5_3.1 |
GStreamer | =0.10.10 | |
GStreamer | =0.8.5 | |
GStreamer | =0.10.9 | |
GStreamer | =0.10.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0397 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2009-0397, update your GStreamer Good Plug-ins to version 0.10.11 or later.
CVE-2009-0397 affects GStreamer Good Plug-ins versions 0.10.9 through 0.10.11 and GStreamer Plug-ins version 0.8.5.
Yes, CVE-2009-0397 can be exploited by remote attackers through crafted Time-to-sample data.
The impact of CVE-2009-0397 could allow attackers to execute arbitrary code on affected systems.