First published: Thu Sep 28 2023(Updated: )
[Integer overflow leading to heap overwrite in MXF file handling with AES3 audio]
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer GStreamer | ||
ubuntu/gst-plugins-bad1.0 | <1.16.3-0ubuntu1.1 | 1.16.3-0ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.20.3-0ubuntu1.1 | 1.20.3-0ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.22.1-1ubuntu1.1 | 1.22.1-1ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.22.4-1ubuntu1.1 | 1.22.4-1ubuntu1.1 |
debian/gst-plugins-bad1.0 | <=1.14.4-1+deb10u2 | 1.14.4-1+deb10u5 1.18.4-3+deb11u4 1.22.0-4+deb12u5 1.22.10-1 1.24.2-3 |
redhat/gstreamer-plugins-bad | <1.22.6 | 1.22.6 |
Gstreamer Project Gstreamer | <1.22.6 |
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/72742dee30cce7bf909639f82de119871566ce39
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/1edd1c38dcc5d27e7c5649d999ee8278872a16d4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40475 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of GStreamer.
CVE-2023-40475 has a severity rating of 8.8 (high severity).
CVE-2023-40475 affects GStreamer and requires interaction with the library to exploit the vulnerability.
You can find more information about CVE-2023-40475 at the following references: [MITRE CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40475), [GStreamer Security Advisory](https://gstreamer.freedesktop.org/security/sa-2023-0007.html), [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-23-1457/).
To fix CVE-2023-40475, update your GStreamer installation to the specified versions provided in the affected software section.