First published: Mon Feb 06 2017(Updated: )
The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gstreamer1-plugins-good | <1.10.3 | 1.10.3 |
GStreamer | <=1.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10199 has a high severity due to its potential to cause denial of service through an out-of-bounds read.
To fix CVE-2016-10199, update GStreamer to version 1.10.3 or later.
CVE-2016-10199 affects GStreamer versions prior to 1.10.3 and specifically targets the gstreamer1-plugins-good package.
Yes, CVE-2016-10199 can be exploited remotely through crafted tag values leading to a crash.
Yes, CVE-2016-10199 is a known vulnerability that has been documented and requires prompt attention.